Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-40438 (GCVE-0-2021-40438)
Vulnerability from cvelistv5
- CWE-918 - Server Side Request Forgery (SSRF)
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | Version: Apache HTTP Server 2.4   < | 
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2021-12-01
Due date: 2021-12-15
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-40438
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:44:10.131Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
          },
          {
            "name": "FEDORA-2021-dce7e7738e",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/"
          },
          {
            "name": "[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "FEDORA-2021-e3f6dd670d",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/"
          },
          {
            "name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
          },
          {
            "name": "[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E"
          },
          {
            "name": "DSA-4982",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4982"
          },
          {
            "name": "[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tenable.com/security/tns-2021-17"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
          },
          {
            "name": "GLSA-202208-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202208-20"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "CHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-40438",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-06T21:08:29.032806Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-12-01",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40438"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:32.274Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40438"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-12-01T00:00:00+00:00",
            "value": "CVE-2021-40438 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Apache HTTP Server",
          "vendor": "Apache Software Foundation",
          "versions": [
            {
              "lessThanOrEqual": "2.4.48",
              "status": "affected",
              "version": "Apache HTTP Server 2.4",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "The issue was discovered by the Apache HTTP security team while analysing CVE-2021-36160"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "other": "high"
            },
            "type": "unknown"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-918",
              "description": "CWE-918 Server Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-14T01:07:57.000Z",
        "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
        "shortName": "apache"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        },
        {
          "name": "FEDORA-2021-dce7e7738e",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/"
        },
        {
          "name": "[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E"
        },
        {
          "name": "FEDORA-2021-e3f6dd670d",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/"
        },
        {
          "name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
        },
        {
          "name": "[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E"
        },
        {
          "name": "DSA-4982",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4982"
        },
        {
          "name": "[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E"
        },
        {
          "name": "20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tenable.com/security/tns-2021-17"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
        },
        {
          "name": "GLSA-202208-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202208-20"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2021-09-16T00:00:00",
          "value": "2.4.49 released"
        }
      ],
      "title": "mod_proxy SSRF",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@apache.org",
          "ID": "CVE-2021-40438",
          "STATE": "PUBLIC",
          "TITLE": "mod_proxy SSRF"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Apache HTTP Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "Apache HTTP Server 2.4",
                            "version_value": "2.4.48"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apache Software Foundation"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "The issue was discovered by the Apache HTTP security team while analysing CVE-2021-36160"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": [
          {
            "other": "high"
          }
        ],
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-918 Server Side Request Forgery (SSRF)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://httpd.apache.org/security/vulnerabilities_24.html",
              "refsource": "MISC",
              "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
            },
            {
              "name": "FEDORA-2021-dce7e7738e",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/"
            },
            {
              "name": "[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "FEDORA-2021-e3f6dd670d",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/"
            },
            {
              "name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
            },
            {
              "name": "[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E"
            },
            {
              "name": "DSA-4982",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4982"
            },
            {
              "name": "[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
            },
            {
              "name": "https://www.oracle.com/security-alerts/cpujan2022.html",
              "refsource": "MISC",
              "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
            },
            {
              "name": "https://www.tenable.com/security/tns-2021-17",
              "refsource": "CONFIRM",
              "url": "https://www.tenable.com/security/tns-2021-17"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
            },
            {
              "name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
              "refsource": "MISC",
              "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
            },
            {
              "name": "GLSA-202208-20",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202208-20"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        },
        "timeline": [
          {
            "lang": "en",
            "time": "2021-09-16T00:00:00",
            "value": "2.4.49 released"
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
    "assignerShortName": "apache",
    "cveId": "CVE-2021-40438",
    "datePublished": "2021-09-16T14:40:23.000Z",
    "dateReserved": "2021-09-02T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:32.274Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "cisa_known_exploited": {
      "cveID": "CVE-2021-40438",
      "cwes": "[\"CWE-918\"]",
      "dateAdded": "2021-12-01",
      "dueDate": "2021-12-15",
      "knownRansomwareCampaignUse": "Unknown",
      "notes": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
      "product": "Apache",
      "requiredAction": "Apply updates per vendor instructions.",
      "shortDescription": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
      "vendorProject": "Apache",
      "vulnerabilityName": "Apache HTTP Server-Side Request Forgery (SSRF)"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-40438\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2021-09-16T15:15:07.633\",\"lastModified\":\"2025-10-27T17:37:06.747\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.\"},{\"lang\":\"es\",\"value\":\"Un uri-path dise\u00f1ado puede causar que mod_proxy reenv\u00ede la petici\u00f3n a un servidor de origen elegido por el usuario remoto. Este problema afecta a Apache HTTP Server versiones 2.4.48 y anteriores\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":6.0},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2021-12-01\",\"cisaActionDue\":\"2021-12-15\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Apache HTTP Server-Side Request Forgery (SSRF)\",\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:resf:rocky_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B10764-9920-49E3-B816-FCA37E546DF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2466282-51AB-478D-9FF4-FA524265ED2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7EE4B6-A6EC-4B9B-91DF-79615796673F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC7808D1-B267-4361-8187-5AB70B64179A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BC9265-6959-4D37-BE5E-8C45E98992F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831F0F47-3565-4763-B16F-C87B1FF2035E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3F09B5-569F-4C58-9FCA-3C0953D107B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3741B8-851F-475D-B428-523F4F722350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C31522-0A17-4025-B269-855C7F4B45C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F797F2E-00E6-4D03-A94E-524227529A0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EFBEEE7-8BC5-4F4E-8EFA-42A6743152BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83981111-E13A-4A88-80FD-F63D7CCAA47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2148300C-ECBD-4ED5-A164-79629859DD43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C21FE1-EA5C-498F-9C6C-D05F91A88217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280D547B-F204-4848-9262-A103176B740C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C9BD9AE-46FC-4609-8D99-A3CFE91D58D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83364F5C-57F4-4D57-B54F-540CAC1D7753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"725566B6-4319-489E-9A69-9E36ED2950DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CDCFF34-6F1D-45A1-BE37-6A0E17B04801\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47811209-5CE5-4375-8391-B0A7F6A0E420\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EB6F417-25D0-4A28-B7BA-D21929EAA9E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C80DB2-4A78-4EC9-B2A8-1E4D902C4834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983533DD-3970-4A37-9A9C-582BD48AA1E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"729C515E-1DD3-466D-A50B-AFE058FFC94A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A49ABD84-6755-4894-AD4E-49AAD39933C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37CE1DC7-72C5-483C-8921-0B462C8284D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6897676D-53F9-45B3-B27F-7FF9A4C58D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28F226A-CBC7-4A32-BE58-398FA5B42481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C24D94-834A-4E9D-8F73-624AFA99AAA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B5CF5A-D48E-4AD0-91E2-F5BDD44B7A66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F33DBA-25BA-4A29-A80C-A9FB96FFE721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DF2B9A2-8CA6-4EDF-9975-07265E363ED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA6A5AF-2EBE-4ED9-B312-DCD9D150D031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22D095ED-9247-4133-A133-73B7668565E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"871A5C26-DB7B-4870-A5B2-5DD24C90B4A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A809B2-2771-4780-9E0D-6A7B4A534CFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09ACF2D-D83F-4A86-8185-9569605D8EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC10D919-57FD-4725-B8D2-39ECB476902F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1272DF03-7674-4BD4-8E64-94004B195448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1CA946D-1665-4874-9D41-C7D963DD1F56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C450C83-695F-4408-8B4F-0E7D6DDAE345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3707B08D-8A78-48CB-914C-33A753D13FC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ADDB02D-F377-43CE-B0A8-FC6C7D5CFABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D3CC6E-3A8F-4694-B3CC-0DB12A3E9A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E881C927-DF96-4D2E-9887-FF12E456B1FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB096D5D-E8F6-4164-8B76-0217B7151D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01ED4F33-EBE7-4C04-8312-3DA580EFFB68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4.48\",\"matchCriteriaId\":\"1691C7CE-5CDA-4B9A-854E-3B58C1115526\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ADFF451-740F-4DBA-BD23-3881945D3E40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2748912-FC54-47F6-8C0C-B96784765B8E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:f5os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0\",\"versionEndIncluding\":\"1.1.4\",\"matchCriteriaId\":\"80A2EFAB-4D06-4254-B2FE-5D1F84BDFD3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:f5os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.2.0\",\"versionEndIncluding\":\"1.2.1\",\"matchCriteriaId\":\"DBACFB6F-D57E-4ECA-81BB-9388E64F7DF3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B095CC03-7077-4A58-AB25-CC5380CDCE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC79B17-E9D2-44D5-93ED-2F959E7A3D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD04BEE5-E9A8-4584-A68C-0195CE9C402C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EA4BA7-C38B-4AF3-8914-9E3D089EBDD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9C9BC66-FA5F-4774-9BDA-7AB88E2839C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F69B9A5-F21B-4904-9F27-95C0F7A628E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DA11710-9EA8-49B4-8FD1-3AEE442F6ADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E503FB-6279-4D4A-91D8-E237ECF9D2B0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:ruggedcom_nms:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"414A7F48-EFA5-4D86-9F8D-5A179A6CFC39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.3\",\"matchCriteriaId\":\"BEF5E6CF-BBA5-4CCF-ACB1-BEF8D2C372B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"98CC9C9A-FE14-4D50-A8EC-C309229356C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D889831F-64D0-428A-A26C-71152C3B9974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A5CC25-A323-4D49-8989-5A417D12D646\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.19.1\",\"matchCriteriaId\":\"A686FAF0-1383-4BBB-B7F5-CBCCAB55B356\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://security.gentoo.org/glsa/202208-20\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20211008-0004/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ\",\"source\":\"security@apache.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4982\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-17\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://security.gentoo.org/glsa/202208-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20211008-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4982\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40438\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/\", \"name\": \"FEDORA-2021-dce7e7738e\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/\", \"name\": \"FEDORA-2021-e3f6dd670d\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html\", \"name\": \"[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E\", \"name\": \"[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-4982\", \"name\": \"DSA-4982\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ\", \"name\": \"20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2022.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-17\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211008-0004/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202208-20\", \"name\": \"GLSA-202208-20\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T02:44:10.131Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-40438\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-06T21:08:29.032806Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2021-12-01\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40438\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2021-12-01T00:00:00+00:00\", \"value\": \"CVE-2021-40438 added to CISA KEV\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-06T21:08:13.144Z\"}}], \"cna\": {\"title\": \"mod_proxy SSRF\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"value\": \"The issue was discovered by the Apache HTTP security team while analysing CVE-2021-36160\"}], \"metrics\": [{\"other\": {\"type\": \"unknown\", \"content\": {\"other\": \"high\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache HTTP Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"Apache HTTP Server 2.4\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.4.48\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2021-09-16T00:00:00\", \"value\": \"2.4.49 released\"}], \"references\": [{\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/\", \"name\": \"FEDORA-2021-dce7e7738e\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}, {\"url\": \"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/\", \"name\": \"FEDORA-2021-e3f6dd670d\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html\", \"name\": \"[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E\", \"name\": \"[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-4982\", \"name\": \"DSA-4982\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ\", \"name\": \"20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2022.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-17\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211008-0004/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://security.gentoo.org/glsa/202208-20\", \"name\": \"GLSA-202208-20\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-918\", \"description\": \"CWE-918 Server Side Request Forgery (SSRF)\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2022-08-14T01:07:57.000Z\"}, \"x_legacyV4Record\": {\"credit\": [{\"lang\": \"eng\", \"value\": \"The issue was discovered by the Apache HTTP security team while analysing CVE-2021-36160\"}], \"impact\": [{\"other\": \"high\"}], \"source\": {\"discovery\": \"UNKNOWN\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_name\": \"Apache HTTP Server 2.4\", \"version_value\": \"2.4.48\", \"version_affected\": \"\u003c=\"}]}, \"product_name\": \"Apache HTTP Server\"}]}, \"vendor_name\": \"Apache Software Foundation\"}]}}, \"timeline\": [{\"lang\": \"en\", \"time\": \"2021-09-16T00:00:00\", \"value\": \"2.4.49 released\"}], \"data_type\": \"CVE\", \"generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"references\": {\"reference_data\": [{\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"name\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/\", \"name\": \"FEDORA-2021-dce7e7738e\", \"refsource\": \"FEDORA\"}, {\"url\": \"https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/\", \"name\": \"FEDORA-2021-e3f6dd670d\", \"refsource\": \"FEDORA\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html\", \"name\": \"[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E\", \"name\": \"[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression\", \"refsource\": \"MLIST\"}, {\"url\": \"https://www.debian.org/security/2021/dsa-4982\", \"name\": \"DSA-4982\", \"refsource\": \"DEBIAN\"}, {\"url\": \"https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438\", \"refsource\": \"MLIST\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ\", \"name\": \"20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021\", \"refsource\": \"CISCO\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2022.html\", \"name\": \"https://www.oracle.com/security-alerts/cpujan2022.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://www.tenable.com/security/tns-2021-17\", \"name\": \"https://www.tenable.com/security/tns-2021-17\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211008-0004/\", \"name\": \"https://security.netapp.com/advisory/ntap-20211008-0004/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"name\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf\", \"name\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-20\", \"name\": \"GLSA-202208-20\", \"refsource\": \"GENTOO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-918 Server Side Request Forgery (SSRF)\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-40438\", \"STATE\": \"PUBLIC\", \"TITLE\": \"mod_proxy SSRF\", \"ASSIGNER\": \"security@apache.org\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-40438\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T18:48:44.108Z\", \"dateReserved\": \"2021-09-02T00:00:00.000Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2021-09-16T14:40:23.000Z\", \"assignerShortName\": \"apache\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  icsa-22-167-06
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting these vulnerabilities to CISA."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "notes": [
      {
        "category": "summary",
        "text": "Multiple vulnerabilities were identified in the Apache HTTP Server software. These include NULL Pointer Dereferencing, Out-of-bounds Write and Server-Side Request Forgery related vulnerabilities.\n\nSiemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not, or not yet available.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Multiple",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-685781: Multiple Vulnerabilities in Apache HTTP Server Affecting Siemens Products - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-685781.json"
      },
      {
        "category": "self",
        "summary": "SSA-685781: Multiple Vulnerabilities in Apache HTTP Server Affecting Siemens Products - TXT Version",
        "url": "https://cert-portal.siemens.com/productcert/txt/ssa-685781.txt"
      },
      {
        "category": "self",
        "summary": "SSA-685781: Multiple Vulnerabilities in Apache HTTP Server Affecting Siemens Products - PDF Version",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-167-06 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-167-06.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-167-06 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-06"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens Apache HTTP Server",
    "tracking": {
      "current_release_date": "2022-10-11T00:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-22-167-06",
      "initial_release_date": "2022-06-14T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2022-06-14T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2022-10-11T00:00:00.000000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added fix for SINEC NMS"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All_versions_when_using_the_device_firmware_upgrade_mechanism",
                "product": {
                  "name": "RUGGEDCOM NMS",
                  "product_id": "CSAFPID-0001"
                }
              }
            ],
            "category": "product_name",
            "name": "RUGGEDCOM NMS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV1.0.3",
                "product": {
                  "name": "SINEC NMS",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "SINEC NMS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV3.1",
                "product": {
                  "name": "SINEMA Remote Connect Server",
                  "product_id": "CSAFPID-0003"
                }
              }
            ],
            "category": "product_name",
            "name": "SINEMA Remote Connect Server"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SINEMA Server V14",
                  "product_id": "CSAFPID-0004"
                }
              }
            ],
            "category": "product_name",
            "name": "SINEMA Server V14"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-34798",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Restrict access to the affected systems, especially to port 443/tcp, to trusted IP addresses only",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "no_fix_planned",
          "details": "Currently no fix is planned",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V1.0.3 or later version",
          "product_ids": [
            "CSAFPID-0002"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109813788/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1 or later version",
          "product_ids": [
            "CSAFPID-0003"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109811169/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        }
      ],
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-39275",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0002",
          "CSAFPID-0004"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Restrict access to the affected systems, especially to port 443/tcp, to trusted IP addresses only",
          "product_ids": [
            "CSAFPID-0002",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "no_fix_planned",
          "details": "Currently no fix is planned",
          "product_ids": [
            "CSAFPID-0004"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V1.0.3 or later version",
          "product_ids": [
            "CSAFPID-0002"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109813788/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0002",
            "CSAFPID-0004"
          ]
        }
      ],
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0002",
          "CSAFPID-0004"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Restrict access to the affected systems, especially to port 443/tcp, to trusted IP addresses only",
          "product_ids": [
            "CSAFPID-0002",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "no_fix_planned",
          "details": "Currently no fix is planned",
          "product_ids": [
            "CSAFPID-0004"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V1.0.3 or later version",
          "product_ids": [
            "CSAFPID-0002"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109813788/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0002",
            "CSAFPID-0004"
          ]
        }
      ],
      "title": "CVE-2021-40438"
    }
  ]
}
  ICSA-22-167-06
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting these vulnerabilities to CISA."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "notes": [
      {
        "category": "summary",
        "text": "Multiple vulnerabilities were identified in the Apache HTTP Server software. These include NULL Pointer Dereferencing, Out-of-bounds Write and Server-Side Request Forgery related vulnerabilities.\n\nSiemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not, or not yet available.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Multiple",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-685781: Multiple Vulnerabilities in Apache HTTP Server Affecting Siemens Products - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-685781.json"
      },
      {
        "category": "self",
        "summary": "SSA-685781: Multiple Vulnerabilities in Apache HTTP Server Affecting Siemens Products - TXT Version",
        "url": "https://cert-portal.siemens.com/productcert/txt/ssa-685781.txt"
      },
      {
        "category": "self",
        "summary": "SSA-685781: Multiple Vulnerabilities in Apache HTTP Server Affecting Siemens Products - PDF Version",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-167-06 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-167-06.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-167-06 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-06"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens Apache HTTP Server",
    "tracking": {
      "current_release_date": "2022-10-11T00:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-22-167-06",
      "initial_release_date": "2022-06-14T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2022-06-14T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2022-10-11T00:00:00.000000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added fix for SINEC NMS"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All_versions_when_using_the_device_firmware_upgrade_mechanism",
                "product": {
                  "name": "RUGGEDCOM NMS",
                  "product_id": "CSAFPID-0001"
                }
              }
            ],
            "category": "product_name",
            "name": "RUGGEDCOM NMS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV1.0.3",
                "product": {
                  "name": "SINEC NMS",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "SINEC NMS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV3.1",
                "product": {
                  "name": "SINEMA Remote Connect Server",
                  "product_id": "CSAFPID-0003"
                }
              }
            ],
            "category": "product_name",
            "name": "SINEMA Remote Connect Server"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SINEMA Server V14",
                  "product_id": "CSAFPID-0004"
                }
              }
            ],
            "category": "product_name",
            "name": "SINEMA Server V14"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-34798",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Restrict access to the affected systems, especially to port 443/tcp, to trusted IP addresses only",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "no_fix_planned",
          "details": "Currently no fix is planned",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V1.0.3 or later version",
          "product_ids": [
            "CSAFPID-0002"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109813788/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1 or later version",
          "product_ids": [
            "CSAFPID-0003"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109811169/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        }
      ],
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-39275",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0002",
          "CSAFPID-0004"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Restrict access to the affected systems, especially to port 443/tcp, to trusted IP addresses only",
          "product_ids": [
            "CSAFPID-0002",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "no_fix_planned",
          "details": "Currently no fix is planned",
          "product_ids": [
            "CSAFPID-0004"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V1.0.3 or later version",
          "product_ids": [
            "CSAFPID-0002"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109813788/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0002",
            "CSAFPID-0004"
          ]
        }
      ],
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0002",
          "CSAFPID-0004"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Restrict access to the affected systems, especially to port 443/tcp, to trusted IP addresses only",
          "product_ids": [
            "CSAFPID-0002",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "no_fix_planned",
          "details": "Currently no fix is planned",
          "product_ids": [
            "CSAFPID-0004"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V1.0.3 or later version",
          "product_ids": [
            "CSAFPID-0002"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109813788/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0002",
            "CSAFPID-0004"
          ]
        }
      ],
      "title": "CVE-2021-40438"
    }
  ]
}
  opensuse-su-2025:14708-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "owasp-modsecurity-crs-4.9.0-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the owasp-modsecurity-crs-4.9.0-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2025-14708",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14708-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2025:14708-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5RZA3QZZUTFNFHPJESYW5I7GDZGWBEQF/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2025:14708-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5RZA3QZZUTFNFHPJESYW5I7GDZGWBEQF/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-40438 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-40438/"
      }
    ],
    "title": "owasp-modsecurity-crs-4.9.0-1.1 on GA media",
    "tracking": {
      "current_release_date": "2025-01-28T00:00:00Z",
      "generator": {
        "date": "2025-01-28T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2025:14708-1",
      "initial_release_date": "2025-01-28T00:00:00Z",
      "revision_history": [
        {
          "date": "2025-01-28T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "owasp-modsecurity-crs-4.9.0-1.1.aarch64",
                "product": {
                  "name": "owasp-modsecurity-crs-4.9.0-1.1.aarch64",
                  "product_id": "owasp-modsecurity-crs-4.9.0-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.aarch64",
                "product": {
                  "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.aarch64",
                  "product_id": "owasp-modsecurity-crs-apache2-4.9.0-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "owasp-modsecurity-crs-4.9.0-1.1.ppc64le",
                "product": {
                  "name": "owasp-modsecurity-crs-4.9.0-1.1.ppc64le",
                  "product_id": "owasp-modsecurity-crs-4.9.0-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.ppc64le",
                "product": {
                  "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.ppc64le",
                  "product_id": "owasp-modsecurity-crs-apache2-4.9.0-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "owasp-modsecurity-crs-4.9.0-1.1.s390x",
                "product": {
                  "name": "owasp-modsecurity-crs-4.9.0-1.1.s390x",
                  "product_id": "owasp-modsecurity-crs-4.9.0-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.s390x",
                "product": {
                  "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.s390x",
                  "product_id": "owasp-modsecurity-crs-apache2-4.9.0-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "owasp-modsecurity-crs-4.9.0-1.1.x86_64",
                "product": {
                  "name": "owasp-modsecurity-crs-4.9.0-1.1.x86_64",
                  "product_id": "owasp-modsecurity-crs-4.9.0-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.x86_64",
                "product": {
                  "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.x86_64",
                  "product_id": "owasp-modsecurity-crs-apache2-4.9.0-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "owasp-modsecurity-crs-4.9.0-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.aarch64"
        },
        "product_reference": "owasp-modsecurity-crs-4.9.0-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "owasp-modsecurity-crs-4.9.0-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.ppc64le"
        },
        "product_reference": "owasp-modsecurity-crs-4.9.0-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "owasp-modsecurity-crs-4.9.0-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.s390x"
        },
        "product_reference": "owasp-modsecurity-crs-4.9.0-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "owasp-modsecurity-crs-4.9.0-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.x86_64"
        },
        "product_reference": "owasp-modsecurity-crs-4.9.0-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.aarch64"
        },
        "product_reference": "owasp-modsecurity-crs-apache2-4.9.0-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.ppc64le"
        },
        "product_reference": "owasp-modsecurity-crs-apache2-4.9.0-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.s390x"
        },
        "product_reference": "owasp-modsecurity-crs-apache2-4.9.0-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "owasp-modsecurity-crs-apache2-4.9.0-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.x86_64"
        },
        "product_reference": "owasp-modsecurity-crs-apache2-4.9.0-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-40438"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.aarch64",
          "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.ppc64le",
          "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.s390x",
          "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.x86_64",
          "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.aarch64",
          "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.ppc64le",
          "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.s390x",
          "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-40438",
          "url": "https://www.suse.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190703 for CVE-2021-40438",
          "url": "https://bugzilla.suse.com/1190703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.aarch64",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.ppc64le",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.s390x",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.x86_64",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.aarch64",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.ppc64le",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.s390x",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.aarch64",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.ppc64le",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.s390x",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-4.9.0-1.1.x86_64",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.aarch64",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.ppc64le",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.s390x",
            "openSUSE Tumbleweed:owasp-modsecurity-crs-apache2-4.9.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-01-28T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-40438"
    }
  ]
}
  opensuse-su-2021:3522-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for apache2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for apache2 fixes the following issues:\n\n- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)\n- CVE-2021-36160: Fixed an out-of-bounds read via a crafted request uri-path. (bsc#1190702)\n- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)\n- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-SLE-15.3-2021-3522",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3522-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2021:3522-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2021:3522-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190666",
        "url": "https://bugzilla.suse.com/1190666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190669",
        "url": "https://bugzilla.suse.com/1190669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190702",
        "url": "https://bugzilla.suse.com/1190702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190703",
        "url": "https://bugzilla.suse.com/1190703"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34798 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-36160 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-36160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-39275 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-39275/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-40438 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-40438/"
      }
    ],
    "title": "Security update for apache2",
    "tracking": {
      "current_release_date": "2021-10-26T13:40:11Z",
      "generator": {
        "date": "2021-10-26T13:40:11Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2021:3522-1",
      "initial_release_date": "2021-10-26T13:40:11Z",
      "revision_history": [
        {
          "date": "2021-10-26T13:40:11Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-devel-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-devel-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-event-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-event-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-example-pages-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-example-pages-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-prefork-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-prefork-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-utils-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-utils-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-worker-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-worker-2.4.43-3.32.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-doc-2.4.43-3.32.1.noarch",
                "product": {
                  "name": "apache2-doc-2.4.43-3.32.1.noarch",
                  "product_id": "apache2-doc-2.4.43-3.32.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-devel-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-devel-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-event-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-event-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-example-pages-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-example-pages-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-prefork-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-prefork-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-utils-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-utils-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-worker-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-worker-2.4.43-3.32.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-devel-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-devel-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-event-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-event-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-example-pages-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-example-pages-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-prefork-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-prefork-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-utils-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-utils-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-worker-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-worker-2.4.43-3.32.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-devel-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-devel-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-event-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-event-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-example-pages-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-example-pages-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-prefork-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-prefork-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-utils-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-utils-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-worker-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-worker-2.4.43-3.32.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.43-3.32.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.43-3.32.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-event-2.4.43-3.32.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-event-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-event-2.4.43-3.32.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-event-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-event-2.4.43-3.32.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-event-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-event-2.4.43-3.32.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-event-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.43-3.32.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-example-pages-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.43-3.32.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.43-3.32.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.43-3.32.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-34798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34798",
          "url": "https://www.suse.com/security/cve/CVE-2021-34798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190669 for CVE-2021-34798",
          "url": "https://bugzilla.suse.com/1190669"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191297 for CVE-2021-34798",
          "url": "https://bugzilla.suse.com/1191297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-26T13:40:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-36160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-36160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-36160",
          "url": "https://www.suse.com/security/cve/CVE-2021-36160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190702 for CVE-2021-36160",
          "url": "https://bugzilla.suse.com/1190702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-26T13:40:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-36160"
    },
    {
      "cve": "CVE-2021-39275",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-39275"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-39275",
          "url": "https://www.suse.com/security/cve/CVE-2021-39275"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190666 for CVE-2021-39275",
          "url": "https://bugzilla.suse.com/1190666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-26T13:40:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-40438"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
          "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-40438",
          "url": "https://www.suse.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190703 for CVE-2021-40438",
          "url": "https://bugzilla.suse.com/1190703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-devel-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-doc-2.4.43-3.32.1.noarch",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-event-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-example-pages-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-utils-2.4.43-3.32.1.x86_64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.aarch64",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.s390x",
            "openSUSE Leap 15.3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-26T13:40:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-40438"
    }
  ]
}
  opensuse-su-2021:1438-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for apache2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for apache2 fixes the following issues:\n\n- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)\n- CVE-2021-36160: Fixed an out-of-bounds read via a crafted request uri-path. (bsc#1190702)\n- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)\n- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2021-1438",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1438-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2021:1438-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2021:1438-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190666",
        "url": "https://bugzilla.suse.com/1190666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190669",
        "url": "https://bugzilla.suse.com/1190669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190702",
        "url": "https://bugzilla.suse.com/1190702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190703",
        "url": "https://bugzilla.suse.com/1190703"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34798 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-36160 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-36160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-39275 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-39275/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-40438 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-40438/"
      }
    ],
    "title": "Security update for apache2",
    "tracking": {
      "current_release_date": "2021-11-02T11:51:52Z",
      "generator": {
        "date": "2021-11-02T11:51:52Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2021:1438-1",
      "initial_release_date": "2021-11-02T11:51:52Z",
      "revision_history": [
        {
          "date": "2021-11-02T11:51:52Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-lp152.2.21.1.i586",
                "product": {
                  "name": "apache2-2.4.43-lp152.2.21.1.i586",
                  "product_id": "apache2-2.4.43-lp152.2.21.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-lp152.2.21.1.i586",
                "product": {
                  "name": "apache2-devel-2.4.43-lp152.2.21.1.i586",
                  "product_id": "apache2-devel-2.4.43-lp152.2.21.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-lp152.2.21.1.i586",
                "product": {
                  "name": "apache2-event-2.4.43-lp152.2.21.1.i586",
                  "product_id": "apache2-event-2.4.43-lp152.2.21.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-lp152.2.21.1.i586",
                "product": {
                  "name": "apache2-example-pages-2.4.43-lp152.2.21.1.i586",
                  "product_id": "apache2-example-pages-2.4.43-lp152.2.21.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-lp152.2.21.1.i586",
                "product": {
                  "name": "apache2-prefork-2.4.43-lp152.2.21.1.i586",
                  "product_id": "apache2-prefork-2.4.43-lp152.2.21.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-lp152.2.21.1.i586",
                "product": {
                  "name": "apache2-utils-2.4.43-lp152.2.21.1.i586",
                  "product_id": "apache2-utils-2.4.43-lp152.2.21.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-lp152.2.21.1.i586",
                "product": {
                  "name": "apache2-worker-2.4.43-lp152.2.21.1.i586",
                  "product_id": "apache2-worker-2.4.43-lp152.2.21.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-doc-2.4.43-lp152.2.21.1.noarch",
                "product": {
                  "name": "apache2-doc-2.4.43-lp152.2.21.1.noarch",
                  "product_id": "apache2-doc-2.4.43-lp152.2.21.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-lp152.2.21.1.x86_64",
                "product": {
                  "name": "apache2-2.4.43-lp152.2.21.1.x86_64",
                  "product_id": "apache2-2.4.43-lp152.2.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-lp152.2.21.1.x86_64",
                "product": {
                  "name": "apache2-devel-2.4.43-lp152.2.21.1.x86_64",
                  "product_id": "apache2-devel-2.4.43-lp152.2.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-lp152.2.21.1.x86_64",
                "product": {
                  "name": "apache2-event-2.4.43-lp152.2.21.1.x86_64",
                  "product_id": "apache2-event-2.4.43-lp152.2.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
                "product": {
                  "name": "apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
                  "product_id": "apache2-example-pages-2.4.43-lp152.2.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
                "product": {
                  "name": "apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
                  "product_id": "apache2-prefork-2.4.43-lp152.2.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-lp152.2.21.1.x86_64",
                "product": {
                  "name": "apache2-utils-2.4.43-lp152.2.21.1.x86_64",
                  "product_id": "apache2-utils-2.4.43-lp152.2.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-lp152.2.21.1.x86_64",
                "product": {
                  "name": "apache2-worker-2.4.43-lp152.2.21.1.x86_64",
                  "product_id": "apache2-worker-2.4.43-lp152.2.21.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.2",
                "product": {
                  "name": "openSUSE Leap 15.2",
                  "product_id": "openSUSE Leap 15.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-lp152.2.21.1.i586 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586"
        },
        "product_reference": "apache2-2.4.43-lp152.2.21.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-lp152.2.21.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64"
        },
        "product_reference": "apache2-2.4.43-lp152.2.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-lp152.2.21.1.i586 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586"
        },
        "product_reference": "apache2-devel-2.4.43-lp152.2.21.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-lp152.2.21.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.43-lp152.2.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.43-lp152.2.21.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.43-lp152.2.21.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-event-2.4.43-lp152.2.21.1.i586 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586"
        },
        "product_reference": "apache2-event-2.4.43-lp152.2.21.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-event-2.4.43-lp152.2.21.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64"
        },
        "product_reference": "apache2-event-2.4.43-lp152.2.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.43-lp152.2.21.1.i586 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586"
        },
        "product_reference": "apache2-example-pages-2.4.43-lp152.2.21.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.43-lp152.2.21.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-lp152.2.21.1.i586 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586"
        },
        "product_reference": "apache2-prefork-2.4.43-lp152.2.21.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-lp152.2.21.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-lp152.2.21.1.i586 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586"
        },
        "product_reference": "apache2-utils-2.4.43-lp152.2.21.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-lp152.2.21.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.43-lp152.2.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-lp152.2.21.1.i586 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586"
        },
        "product_reference": "apache2-worker-2.4.43-lp152.2.21.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-lp152.2.21.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.43-lp152.2.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-34798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
          "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34798",
          "url": "https://www.suse.com/security/cve/CVE-2021-34798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190669 for CVE-2021-34798",
          "url": "https://bugzilla.suse.com/1190669"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191297 for CVE-2021-34798",
          "url": "https://bugzilla.suse.com/1191297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-11-02T11:51:52Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-36160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-36160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
          "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-36160",
          "url": "https://www.suse.com/security/cve/CVE-2021-36160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190702 for CVE-2021-36160",
          "url": "https://bugzilla.suse.com/1190702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-11-02T11:51:52Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-36160"
    },
    {
      "cve": "CVE-2021-39275",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-39275"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
          "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-39275",
          "url": "https://www.suse.com/security/cve/CVE-2021-39275"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190666 for CVE-2021-39275",
          "url": "https://bugzilla.suse.com/1190666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-11-02T11:51:52Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-40438"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
          "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
          "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
          "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-40438",
          "url": "https://www.suse.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190703 for CVE-2021-40438",
          "url": "https://bugzilla.suse.com/1190703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-devel-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-doc-2.4.43-lp152.2.21.1.noarch",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-event-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-example-pages-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-prefork-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-utils-2.4.43-lp152.2.21.1.x86_64",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.i586",
            "openSUSE Leap 15.2:apache2-worker-2.4.43-lp152.2.21.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-11-02T11:51:52Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-40438"
    }
  ]
}
  rhsa-2021:3745
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 9 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 9 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 8 and includes an important security update. Refer to the Release Notes for information on the security fix included in this release.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3745",
        "url": "https://access.redhat.com/errata/RHSA-2021:3745"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3745.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP9 security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:41:59+00:00",
      "generator": {
        "date": "2025-10-09T21:41:59+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3745",
      "initial_release_date": "2021-10-07T13:35:15+00:00",
      "revision_history": [
        {
          "date": "2021-10-07T13:35:15+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-07T13:35:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:41:59+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Text-Only JBCS",
                "product": {
                  "name": "Text-Only JBCS",
                  "product_id": "Text-Only JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Text-Only JBCS"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-07T13:35:15+00:00",
          "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
          "product_ids": [
            "Text-Only JBCS"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3745"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "Text-Only JBCS"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Text-Only JBCS"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021:3754
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3754",
        "url": "https://access.redhat.com/errata/RHSA-2021:3754"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3754.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd24-httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:41:59+00:00",
      "generator": {
        "date": "2025-10-09T21:41:59+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3754",
      "initial_release_date": "2021-10-11T08:06:55+00:00",
      "revision_history": [
        {
          "date": "2021-10-11T08:06:55+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-11T08:06:55+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:41:59+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-RHSCL-3.7",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-RHSCL-3.7",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Software Collections"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.src",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.src",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-22.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-22.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-22.el7.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-22.el7.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-22.el7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-22.el7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
                "product": {
                  "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
                  "product_id": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-22.el7.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.src",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.src",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
          "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
          "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-11T08:06:55+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3754"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021:3816
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\n* httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3816",
        "url": "https://access.redhat.com/errata/RHSA-2021:3816"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1966732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3816.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd:2.4 security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:29:44+00:00",
      "generator": {
        "date": "2025-10-09T21:29:44+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3816",
      "initial_release_date": "2021-10-12T16:30:28+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T16:30:28+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T16:30:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:29:44+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=src\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=src\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=noarch\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=noarch\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "the Apache project",
            "Christophe Jaillet"
          ]
        }
      ],
      "cve": "CVE-2021-26691",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-05-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1966732"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_session: Heap overflow via a crafted SessionHeader value",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw can result in a crash of the httpd child process when mod_session is used.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-26691"
        },
        {
          "category": "external",
          "summary": "RHBZ#1966732",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26691",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2021-06-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:30:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3816"
        },
        {
          "category": "workaround",
          "details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_session: Heap overflow via a crafted SessionHeader value"
    },
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:30:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3816"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021_3856
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions, Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3856",
        "url": "https://access.redhat.com/errata/RHSA-2021:3856"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3856.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:39:06+00:00",
      "generator": {
        "date": "2024-11-15T10:39:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3856",
      "initial_release_date": "2021-10-14T10:02:14+00:00",
      "revision_history": [
        {
          "date": "2021-10-14T10:02:14+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-14T10:02:14+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:39:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                  "product_id": "7Server-optional-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                  "product_id": "7Server-optional-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                  "product_id": "7Server-optional-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                  "product_id": "7Server-optional-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                  "product_id": "7Server-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                  "product_id": "7Server-optional-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.6.src",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.6.src",
                  "product_id": "httpd-0:2.4.6-45.el7_3.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.7.src",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.7.src",
                  "product_id": "httpd-0:2.4.6-67.el7_4.7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-89.el7_6.2.src",
                "product": {
                  "name": "httpd-0:2.4.6-89.el7_6.2.src",
                  "product_id": "httpd-0:2.4.6-89.el7_6.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.src",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.src",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-90.el7_7.1.src",
                "product": {
                  "name": "httpd-0:2.4.6-90.el7_7.1.src",
                  "product_id": "httpd-0:2.4.6-90.el7_7.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.7.src",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.7.src",
                  "product_id": "httpd-0:2.4.6-40.el7_2.7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
                  "product_id": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
                  "product_id": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-67.el7_4.7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
                  "product_id": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-89.el7_6.2?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
                  "product_id": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-97.el7_9.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
                  "product_id": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-90.el7_7.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
                  "product_id": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-40.el7_2.7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=ppc64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.src",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.src",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.src",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.src",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
          "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
          "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
          "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
          "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
          "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
          "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
          "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
          "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
          "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
          "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
          "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
          "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-14T10:02:14+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3856"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021:3837
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3837",
        "url": "https://access.redhat.com/errata/RHSA-2021:3837"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3837.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd:2.4 security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:02+00:00",
      "generator": {
        "date": "2025-10-09T21:42:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3837",
      "initial_release_date": "2021-10-13T07:26:27+00:00",
      "revision_history": [
        {
          "date": "2021-10-13T07:26:27+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-13T07:26:27+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
                  "product_id": "AppStream-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=src\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=src\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=noarch\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=noarch\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-13T07:26:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3837"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021_3816
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\n* httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3816",
        "url": "https://access.redhat.com/errata/RHSA-2021:3816"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1966732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3816.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd:2.4 security update",
    "tracking": {
      "current_release_date": "2024-11-22T17:33:47+00:00",
      "generator": {
        "date": "2024-11-22T17:33:47+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3816",
      "initial_release_date": "2021-10-12T16:30:28+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T16:30:28+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T16:30:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T17:33:47+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd:2.4:8040020211008164252:522a0ee4",
                "product": {
                  "name": "httpd:2.4:8040020211008164252:522a0ee4",
                  "product_id": "httpd:2.4:8040020211008164252:522a0ee4",
                  "product_identification_helper": {
                    "purl": "pkg:rpmmod/redhat/httpd@2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
                "product": {
                  "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
                  "product_id": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
                  "product_id": "httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
                "product": {
                  "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
                  "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
                  "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
                "product": {
                  "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
                  "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
                "product": {
                  "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
                  "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
                "product": {
                  "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
                  "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
                "product": {
                  "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
                  "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
                "product": {
                  "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
                  "product_id": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
                "product": {
                  "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
                  "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
                "product": {
                  "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
                  "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
                "product": {
                  "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
                  "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
                  "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
                "product": {
                  "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
                  "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
                "product": {
                  "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
                  "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
                "product": {
                  "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
                  "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
                "product": {
                  "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
                  "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
                "product": {
                  "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
                  "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
                  "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
                "product": {
                  "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
                  "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
                "product": {
                  "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
                  "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
                "product": {
                  "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
                  "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
                "product": {
                  "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
                  "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
                "product": {
                  "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
                  "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
                  "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
                "product": {
                  "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
                  "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
                "product": {
                  "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
                  "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
                "product": {
                  "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
                  "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
                "product": {
                  "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
                  "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
        },
        "product_reference": "httpd:2.4:8040020211008164252:522a0ee4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src"
        },
        "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch"
        },
        "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64"
        },
        "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le"
        },
        "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x"
        },
        "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src"
        },
        "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64"
        },
        "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64"
        },
        "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le"
        },
        "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x"
        },
        "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64"
        },
        "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64"
        },
        "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le"
        },
        "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x"
        },
        "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64"
        },
        "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64"
        },
        "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le"
        },
        "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x"
        },
        "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src"
        },
        "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64"
        },
        "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64"
        },
        "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le"
        },
        "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x"
        },
        "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64"
        },
        "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64"
        },
        "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le"
        },
        "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x"
        },
        "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64"
        },
        "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64 as a component of httpd:2.4:8040020211008164252:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "the Apache project",
            "Christophe Jaillet"
          ]
        }
      ],
      "cve": "CVE-2021-26691",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-05-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1966732"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_session: Heap overflow via a crafted SessionHeader value",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw can result in a crash of the httpd child process when mod_session is used.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-26691"
        },
        {
          "category": "external",
          "summary": "RHBZ#1966732",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26691",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2021-06-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:30:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3816"
        },
        {
          "category": "workaround",
          "details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_session: Heap overflow via a crafted SessionHeader value"
    },
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:30:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3816"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd:2.4:8040020211008164252:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021:3856
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions, Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3856",
        "url": "https://access.redhat.com/errata/RHSA-2021:3856"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3856.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:02+00:00",
      "generator": {
        "date": "2025-10-09T21:42:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3856",
      "initial_release_date": "2021-10-14T10:02:14+00:00",
      "revision_history": [
        {
          "date": "2021-10-14T10:02:14+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-14T10:02:14+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                  "product_id": "7Server-optional-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                  "product_id": "7Server-optional-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                  "product_id": "7Server-optional-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                  "product_id": "7Server-optional-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                  "product_id": "7Server-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                  "product_id": "7Server-optional-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.6.src",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.6.src",
                  "product_id": "httpd-0:2.4.6-45.el7_3.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.7.src",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.7.src",
                  "product_id": "httpd-0:2.4.6-67.el7_4.7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-89.el7_6.2.src",
                "product": {
                  "name": "httpd-0:2.4.6-89.el7_6.2.src",
                  "product_id": "httpd-0:2.4.6-89.el7_6.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.src",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.src",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-90.el7_7.1.src",
                "product": {
                  "name": "httpd-0:2.4.6-90.el7_7.1.src",
                  "product_id": "httpd-0:2.4.6-90.el7_7.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.7.src",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.7.src",
                  "product_id": "httpd-0:2.4.6-40.el7_2.7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
                  "product_id": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
                  "product_id": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-67.el7_4.7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
                  "product_id": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-89.el7_6.2?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
                  "product_id": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-97.el7_9.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
                  "product_id": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-90.el7_7.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
                  "product_id": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-40.el7_2.7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=ppc64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.src",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.src",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.src",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.src",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
          "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
          "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
          "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
          "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
          "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
          "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
          "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
          "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
          "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
          "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
          "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
          "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-14T10:02:14+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3856"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021:3836
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3836",
        "url": "https://access.redhat.com/errata/RHSA-2021:3836"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3836.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd:2.4 security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:01+00:00",
      "generator": {
        "date": "2025-10-09T21:42:01+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3836",
      "initial_release_date": "2021-10-13T07:33:43+00:00",
      "revision_history": [
        {
          "date": "2021-10-13T07:33:43+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-13T07:33:43+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:01+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=src\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=src\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=src\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=noarch\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=noarch\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-13T07:33:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3836"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021_3746
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 9, and fix an important security issue, are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 9 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 8 and includes an important security update. Refer to the Release Notes for information on the security fix included in this release.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3746",
        "url": "https://access.redhat.com/errata/RHSA-2021:3746"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3746.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP9 security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:39:14+00:00",
      "generator": {
        "date": "2024-11-15T10:39:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3746",
      "initial_release_date": "2021-10-07T13:48:00+00:00",
      "revision_history": [
        {
          "date": "2021-10-07T13:48:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-07T13:48:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:39:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                  "product_id": "7Server-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 8",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 8",
                  "product_id": "8Base-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-18.redhat_1.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.el8jbcs?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-18.redhat_1.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.el8jbcs?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-76.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-76.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-7.Final_redhat_2.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-38.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-18.redhat_1.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-18.redhat_1.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-18.redhat_1.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-65.GA.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-19.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-38.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-7.Final_redhat_2.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-19.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-18.redhat_1.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-18.redhat_1.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.48-18.redhat_1.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-65.GA.el8jbcs?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-76.jbcs.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-76.el8jbcs?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
          "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-07T13:48:00+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
            "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3746"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
            "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
            "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021:3746
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 9, and fix an important security issue, are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 9 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 8 and includes an important security update. Refer to the Release Notes for information on the security fix included in this release.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3746",
        "url": "https://access.redhat.com/errata/RHSA-2021:3746"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3746.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP9 security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:41:59+00:00",
      "generator": {
        "date": "2025-10-09T21:41:59+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3746",
      "initial_release_date": "2021-10-07T13:48:00+00:00",
      "revision_history": [
        {
          "date": "2021-10-07T13:48:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-07T13:48:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:41:59+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                  "product_id": "7Server-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 8",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 8",
                  "product_id": "8Base-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-18.redhat_1.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.el8jbcs?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-18.redhat_1.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.el8jbcs?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-76.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-76.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-7.Final_redhat_2.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-38.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-18.redhat_1.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-18.redhat_1.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-18.redhat_1.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-65.GA.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-19.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-38.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-7.Final_redhat_2.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-19.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-18.redhat_1.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-18.redhat_1.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.48-18.redhat_1.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-65.GA.el8jbcs?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-76.jbcs.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-76.el8jbcs?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
          "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-07T13:48:00+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
            "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3746"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
            "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
            "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  RHSA-2021:3836
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3836",
        "url": "https://access.redhat.com/errata/RHSA-2021:3836"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3836.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd:2.4 security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:01+00:00",
      "generator": {
        "date": "2025-10-09T21:42:01+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3836",
      "initial_release_date": "2021-10-13T07:33:43+00:00",
      "revision_history": [
        {
          "date": "2021-10-13T07:33:43+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-13T07:33:43+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:01+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=src\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=src\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=src\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=noarch\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=noarch\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8020020211008164029:4cda2c84"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
          "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-13T07:33:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3836"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-debugsource-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-devel-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-filesystem-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-manual-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:httpd-tools-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ldap-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.src.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debuginfo-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_md-debugsource-2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_session-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x.rpm-httpd:2.4",
            "AppStream-8.2.0.Z.EUS:mod_ssl-debuginfo-2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021_3836
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3836",
        "url": "https://access.redhat.com/errata/RHSA-2021:3836"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3836.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd:2.4 security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:38:53+00:00",
      "generator": {
        "date": "2024-11-15T10:38:53+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3836",
      "initial_release_date": "2021-10-13T07:33:43+00:00",
      "revision_history": [
        {
          "date": "2021-10-13T07:33:43+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-13T07:33:43+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:38:53+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd:2.4:8020020211008164029:4cda2c84",
                "product": {
                  "name": "httpd:2.4:8020020211008164029:4cda2c84",
                  "product_id": "httpd:2.4:8020020211008164029:4cda2c84",
                  "product_identification_helper": {
                    "purl": "pkg:rpmmod/redhat/httpd@2.4:8020020211008164029:4cda2c84"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
                "product": {
                  "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
                  "product_id": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
                  "product_id": "httpd-manual-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
                "product": {
                  "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
                  "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
                  "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
                "product": {
                  "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
                  "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
                "product": {
                  "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
                  "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
                "product": {
                  "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
                  "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
                "product": {
                  "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
                  "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src",
                "product": {
                  "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src",
                  "product_id": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src",
                "product": {
                  "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src",
                  "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src",
                "product": {
                  "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src",
                  "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
                "product": {
                  "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
                  "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
                  "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
                "product": {
                  "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
                  "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
                "product": {
                  "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
                  "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
                "product": {
                  "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
                  "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
                "product": {
                  "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
                  "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
                "product": {
                  "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
                  "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
                  "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
                "product": {
                  "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
                  "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
                "product": {
                  "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
                  "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
                "product": {
                  "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
                  "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
                "product": {
                  "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
                  "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
                "product": {
                  "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
                  "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
                  "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
                "product": {
                  "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
                  "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
                "product": {
                  "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
                  "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
                "product": {
                  "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
                  "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
                "product": {
                  "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
                  "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B12904%2B53ee7aba.1?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
        },
        "product_reference": "httpd:2.4:8020020211008164029:4cda2c84",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src"
        },
        "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch"
        },
        "product_reference": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64"
        },
        "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le"
        },
        "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x"
        },
        "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src"
        },
        "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64"
        },
        "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64"
        },
        "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le"
        },
        "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x"
        },
        "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64"
        },
        "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64"
        },
        "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le"
        },
        "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x"
        },
        "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64"
        },
        "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64"
        },
        "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le"
        },
        "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x"
        },
        "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src"
        },
        "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64"
        },
        "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64"
        },
        "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le"
        },
        "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x"
        },
        "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64"
        },
        "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64"
        },
        "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le"
        },
        "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x"
        },
        "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64"
        },
        "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64 as a component of httpd:2.4:8020020211008164029:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
          "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-13T07:33:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3836"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.src",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.noarch",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.aarch64",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.ppc64le",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.s390x",
            "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020211008164029:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+12904+53ee7aba.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  RHSA-2021:3856
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions, Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3856",
        "url": "https://access.redhat.com/errata/RHSA-2021:3856"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3856.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:02+00:00",
      "generator": {
        "date": "2025-10-09T21:42:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3856",
      "initial_release_date": "2021-10-14T10:02:14+00:00",
      "revision_history": [
        {
          "date": "2021-10-14T10:02:14+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-14T10:02:14+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
                  "product_id": "7Server-optional-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
                  "product_id": "7Server-optional-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                  "product_id": "7Server-optional-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                  "product_id": "7Server-optional-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                  "product_id": "7Server-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
                  "product_id": "7Server-optional-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.6.src",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.6.src",
                  "product_id": "httpd-0:2.4.6-45.el7_3.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.7.src",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.7.src",
                  "product_id": "httpd-0:2.4.6-67.el7_4.7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-89.el7_6.2.src",
                "product": {
                  "name": "httpd-0:2.4.6-89.el7_6.2.src",
                  "product_id": "httpd-0:2.4.6-89.el7_6.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.2?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.src",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.src",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-90.el7_7.1.src",
                "product": {
                  "name": "httpd-0:2.4.6-90.el7_7.1.src",
                  "product_id": "httpd-0:2.4.6-90.el7_7.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.7.src",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.7.src",
                  "product_id": "httpd-0:2.4.6-40.el7_2.7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
                  "product_id": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
                  "product_id": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-67.el7_4.7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
                  "product_id": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-89.el7_6.2?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
                  "product_id": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-97.el7_9.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
                  "product_id": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-90.el7_7.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
                  "product_id": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-40.el7_2.7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=ppc64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_session-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.1?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.src",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.src",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.7.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.src",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.6.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.src",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.7.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
          "product_id": "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.src",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-89.el7_6.2.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-89.el7_6.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.src",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-90.el7_7.1.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-90.el7_7.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-97.el7_9.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-97.el7_9.1.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
          "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
          "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
          "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
          "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
          "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
          "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
          "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
          "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
          "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
          "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
          "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
          "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
          "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
          "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
          "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
          "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
          "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
          "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
          "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
          "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
          "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
          "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
          "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
          "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-14T10:02:14+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3856"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.src",
            "7Server-optional-7.2.AUS:httpd-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-debuginfo-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-devel-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:httpd-manual-0:2.4.6-40.el7_2.7.noarch",
            "7Server-optional-7.2.AUS:httpd-tools-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ldap-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_proxy_html-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_session-0:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.2.AUS:mod_ssl-1:2.4.6-40.el7_2.7.x86_64",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.src",
            "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.6.noarch",
            "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.6.x86_64",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.src",
            "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.7.noarch",
            "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.7.x86_64",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.ppc64le",
            "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.src",
            "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.2.noarch",
            "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.2.x86_64",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.ppc64le",
            "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.src",
            "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.1.noarch",
            "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.1.x86_64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.src",
            "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.1.noarch",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.1.x86_64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.ppc64le",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.s390x",
            "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  RHSA-2021:3837
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3837",
        "url": "https://access.redhat.com/errata/RHSA-2021:3837"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3837.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd:2.4 security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:02+00:00",
      "generator": {
        "date": "2025-10-09T21:42:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3837",
      "initial_release_date": "2021-10-13T07:26:27+00:00",
      "revision_history": [
        {
          "date": "2021-10-13T07:26:27+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-13T07:26:27+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
                  "product_id": "AppStream-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=src\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=src\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=noarch\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=noarch\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8010020211008125020:c27ad7f8"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
          "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-13T07:26:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3837"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-debugsource-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-devel-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-filesystem-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-manual-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_md-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_session-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x.rpm-httpd:2.4",
            "AppStream-8.1.0.Z.EUS:mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  RHSA-2021:3745
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 9 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 9 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 8 and includes an important security update. Refer to the Release Notes for information on the security fix included in this release.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3745",
        "url": "https://access.redhat.com/errata/RHSA-2021:3745"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3745.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP9 security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:41:59+00:00",
      "generator": {
        "date": "2025-10-09T21:41:59+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3745",
      "initial_release_date": "2021-10-07T13:35:15+00:00",
      "revision_history": [
        {
          "date": "2021-10-07T13:35:15+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-07T13:35:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:41:59+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Text-Only JBCS",
                "product": {
                  "name": "Text-Only JBCS",
                  "product_id": "Text-Only JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Text-Only JBCS"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-07T13:35:15+00:00",
          "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
          "product_ids": [
            "Text-Only JBCS"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3745"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "Text-Only JBCS"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Text-Only JBCS"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  RHSA-2021:3754
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3754",
        "url": "https://access.redhat.com/errata/RHSA-2021:3754"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3754.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd24-httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:41:59+00:00",
      "generator": {
        "date": "2025-10-09T21:41:59+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3754",
      "initial_release_date": "2021-10-11T08:06:55+00:00",
      "revision_history": [
        {
          "date": "2021-10-11T08:06:55+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-11T08:06:55+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:41:59+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-RHSCL-3.7",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-RHSCL-3.7",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Software Collections"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.src",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.src",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-22.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-22.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-22.el7.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-22.el7.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-22.el7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-22.el7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
                "product": {
                  "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
                  "product_id": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-22.el7.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.src",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.src",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
          "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
          "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-11T08:06:55+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3754"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021_3754
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3754",
        "url": "https://access.redhat.com/errata/RHSA-2021:3754"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3754.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd24-httpd security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:39:21+00:00",
      "generator": {
        "date": "2024-11-15T10:39:21+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3754",
      "initial_release_date": "2021-10-11T08:06:55+00:00",
      "revision_history": [
        {
          "date": "2021-10-11T08:06:55+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-11T08:06:55+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:39:21+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-RHSCL-3.7",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-RHSCL-3.7",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Software Collections"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.src",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.src",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-22.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-22.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-22.el7.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-22.el7.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-22.el7.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-22.el7.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-22.el7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-22.el7.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-22.el7.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
                "product": {
                  "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
                  "product_id": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-22.el7.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.src",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.src",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-3.7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
          "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
          "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
          "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
          "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
          "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
          "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
          "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
          "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
          "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
          "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-11T08:06:55+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3754"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Server-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Server-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.src",
            "7Workstation-RHSCL-3.7:httpd24-httpd-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-debuginfo-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-devel-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-httpd-manual-0:2.4.34-22.el7.1.noarch",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-httpd-tools-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ldap-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_proxy_html-1:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_session-0:2.4.34-22.el7.1.x86_64",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.ppc64le",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.s390x",
            "7Workstation-RHSCL-3.7:httpd24-mod_ssl-1:2.4.34-22.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  RHSA-2021:3816
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\n* httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3816",
        "url": "https://access.redhat.com/errata/RHSA-2021:3816"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1966732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3816.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd:2.4 security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:29:44+00:00",
      "generator": {
        "date": "2025-10-09T21:29:44+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3816",
      "initial_release_date": "2021-10-12T16:30:28+00:00",
      "revision_history": [
        {
          "date": "2021-10-12T16:30:28+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-12T16:30:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:29:44+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=src\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=src\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=noarch\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm (httpd:2.4)",
                  "product_id": "httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=noarch\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                "product": {
                  "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4)",
                  "product_id": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B12865%2Ba7065a39.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8040020211008164252:522a0ee4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4"
        },
        "product_reference": "httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        },
        "product_reference": "mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
        "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "the Apache project",
            "Christophe Jaillet"
          ]
        }
      ],
      "cve": "CVE-2021-26691",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2021-05-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1966732"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_session: Heap overflow via a crafted SessionHeader value",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw can result in a crash of the httpd child process when mod_session is used.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-26691"
        },
        {
          "category": "external",
          "summary": "RHBZ#1966732",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26691",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2021-06-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:30:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3816"
        },
        {
          "category": "workaround",
          "details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_session: Heap overflow via a crafted SessionHeader value"
    },
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
          "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-12T16:30:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3816"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-debugsource-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1.noarch.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_session-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.aarch64.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.ppc64le.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.s390x.rpm-httpd:2.4",
            "AppStream-8.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-2.4.37-39.module+el8.4.0+12865+a7065a39.1.x86_64.rpm-httpd:2.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021_3745
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 9 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 9 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 8 and includes an important security update. Refer to the Release Notes for information on the security fix included in this release.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3745",
        "url": "https://access.redhat.com/errata/RHSA-2021:3745"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3745.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP9 security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:39:08+00:00",
      "generator": {
        "date": "2024-11-15T10:39:08+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3745",
      "initial_release_date": "2021-10-07T13:35:15+00:00",
      "revision_history": [
        {
          "date": "2021-10-07T13:35:15+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-07T13:35:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:39:08+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services 1",
                "product": {
                  "name": "Red Hat JBoss Core Services 1",
                  "product_id": "Red Hat JBoss Core Services 1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Core Services 1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-07T13:35:15+00:00",
          "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
          "product_ids": [
            "Red Hat JBoss Core Services 1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3745"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "Red Hat JBoss Core Services 1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat JBoss Core Services 1"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  rhsa-2021_3837
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\" (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3837",
        "url": "https://access.redhat.com/errata/RHSA-2021:3837"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3837.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd:2.4 security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:39:00+00:00",
      "generator": {
        "date": "2024-11-15T10:39:00+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3837",
      "initial_release_date": "2021-10-13T07:26:27+00:00",
      "revision_history": [
        {
          "date": "2021-10-13T07:26:27+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-13T07:26:27+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:39:00+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
                  "product_id": "AppStream-8.1.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd:2.4:8010020211008125020:c27ad7f8",
                "product": {
                  "name": "httpd:2.4:8010020211008125020:c27ad7f8",
                  "product_id": "httpd:2.4:8010020211008125020:c27ad7f8",
                  "product_identification_helper": {
                    "purl": "pkg:rpmmod/redhat/httpd@2.4:8010020211008125020:c27ad7f8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
                "product": {
                  "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
                  "product_id": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
                  "product_id": "httpd-manual-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
                "product": {
                  "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
                  "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
                  "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
                "product": {
                  "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
                  "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src",
                "product": {
                  "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src",
                  "product_id": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src",
                "product": {
                  "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src",
                  "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
                "product": {
                  "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
                  "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
                  "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
                "product": {
                  "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
                  "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
                "product": {
                  "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
                  "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
                  "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
                "product": {
                  "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
                  "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
                "product": {
                  "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
                  "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
                "product": {
                  "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
                  "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
                "product": {
                  "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
                  "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                "product": {
                  "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_id": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B12900%2B7e6e5641.1?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
        },
        "product_reference": "httpd:2.4:8010020211008125020:c27ad7f8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src"
        },
        "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch"
        },
        "product_reference": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64"
        },
        "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le"
        },
        "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x"
        },
        "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src"
        },
        "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64"
        },
        "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64"
        },
        "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le"
        },
        "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x"
        },
        "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64"
        },
        "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64"
        },
        "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le"
        },
        "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x"
        },
        "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64"
        },
        "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64 as a component of httpd:2.4:8010020211008125020:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
          "product_id": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        },
        "product_reference": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
          "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-13T07:26:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3837"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.src",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.noarch",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.aarch64",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.ppc64le",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.s390x",
            "AppStream-8.1.0.Z.EUS:httpd:2.4:8010020211008125020:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+12900+7e6e5641.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  RHSA-2021:3746
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 9, and fix an important security issue, are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 9 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 8 and includes an important security update. Refer to the Release Notes for information on the security fix included in this release.\n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path (CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3746",
        "url": "https://access.redhat.com/errata/RHSA-2021:3746"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2005117",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3746.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP9 security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:41:59+00:00",
      "generator": {
        "date": "2025-10-09T21:41:59+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3746",
      "initial_release_date": "2021-10-07T13:48:00+00:00",
      "revision_history": [
        {
          "date": "2021-10-07T13:48:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-10-07T13:48:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:41:59+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                  "product_id": "7Server-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 8",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 8",
                  "product_id": "8Base-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-18.redhat_1.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.jbcs.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.el8jbcs?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-18.redhat_1.el8jbcs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.el8jbcs?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-76.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-76.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-76.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-7.Final_redhat_2.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-38.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-18.redhat_1.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-18.redhat_1.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-18.redhat_1.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-65.GA.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-19.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.37-76.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.37-76.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-38.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-38.el8jbcs?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-7.Final_redhat_2.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-7.Final_redhat_2.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-19.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-19.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-18.redhat_1.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-18.redhat_1.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.48-18.redhat_1.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-65.GA.el8jbcs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-65.GA.el8jbcs?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-76.jbcs.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-76.el8jbcs?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
          "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
        "relates_to_product_reference": "8Base-JBCS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "discovery_date": "2021-09-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2005117"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information.\n\nThe version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported.\nThe version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket.\n\nThe flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
          "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
          "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
          "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "RHBZ#2005117",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005117"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-10-07T13:48:00+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
            "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3746"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
            "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.jbcs.el7.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-76.el8jbcs.noarch",
            "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-7.Final_redhat_2.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-19.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-18.redhat_1.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-38.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.src",
            "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-65.GA.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-76.el8jbcs.x86_64",
            "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-76.el8jbcs.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2021-12-01T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\""
    }
  ]
}
  WID-SEC-W-2024-1591
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service  zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1591 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1591 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
      },
      {
        "category": "external",
        "summary": "Juniper Patchday July 2024 vom 2024-07-10",
        "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
      }
    ],
    "source_lang": "en-US",
    "title": "Juniper JUNOS: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-11-11T23:00:00.000+00:00",
      "generator": {
        "date": "2024-11-12T09:31:28.569+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-1591",
      "initial_release_date": "2024-07-10T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-07-10T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "2",
          "summary": "URL Kodierung angepasst"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Juniper JUNOS",
            "product": {
              "name": "Juniper JUNOS",
              "product_id": "T036093",
              "product_identification_helper": {
                "cpe": "cpe:/o:juniper:junos:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2006-20001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2006-20001"
    },
    {
      "cve": "CVE-2007-5846",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2007-5846"
    },
    {
      "cve": "CVE-2008-6123",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2008-6123"
    },
    {
      "cve": "CVE-2011-1473",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-1473"
    },
    {
      "cve": "CVE-2011-5094",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-5094"
    },
    {
      "cve": "CVE-2012-6151",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2012-6151"
    },
    {
      "cve": "CVE-2014-10064",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-10064"
    },
    {
      "cve": "CVE-2014-2285",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2285"
    },
    {
      "cve": "CVE-2014-2310",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2310"
    },
    {
      "cve": "CVE-2014-3565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-3565"
    },
    {
      "cve": "CVE-2014-7191",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-7191"
    },
    {
      "cve": "CVE-2014-8882",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-8882"
    },
    {
      "cve": "CVE-2015-5621",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-5621"
    },
    {
      "cve": "CVE-2015-8100",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-8100"
    },
    {
      "cve": "CVE-2015-9262",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-9262"
    },
    {
      "cve": "CVE-2016-1000232",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-1000232"
    },
    {
      "cve": "CVE-2016-10540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-10540"
    },
    {
      "cve": "CVE-2016-4658",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-4658"
    },
    {
      "cve": "CVE-2017-1000048",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-1000048"
    },
    {
      "cve": "CVE-2017-15010",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-15010"
    },
    {
      "cve": "CVE-2018-18065",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-18065"
    },
    {
      "cve": "CVE-2018-20834",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-20834"
    },
    {
      "cve": "CVE-2018-3737",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-3737"
    },
    {
      "cve": "CVE-2018-7408",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-7408"
    },
    {
      "cve": "CVE-2019-10081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10081"
    },
    {
      "cve": "CVE-2019-10082",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10082"
    },
    {
      "cve": "CVE-2019-10092",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10092"
    },
    {
      "cve": "CVE-2019-10097",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10097"
    },
    {
      "cve": "CVE-2019-10098",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10098"
    },
    {
      "cve": "CVE-2019-11719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11719"
    },
    {
      "cve": "CVE-2019-11727",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11727"
    },
    {
      "cve": "CVE-2019-11756",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11756"
    },
    {
      "cve": "CVE-2019-16775",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16775"
    },
    {
      "cve": "CVE-2019-16776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16776"
    },
    {
      "cve": "CVE-2019-16777",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16777"
    },
    {
      "cve": "CVE-2019-17006",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17006"
    },
    {
      "cve": "CVE-2019-17023",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17023"
    },
    {
      "cve": "CVE-2019-17567",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17567"
    },
    {
      "cve": "CVE-2019-20149",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20149"
    },
    {
      "cve": "CVE-2019-20892",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20892"
    },
    {
      "cve": "CVE-2019-9517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-9517"
    },
    {
      "cve": "CVE-2020-11668",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11668"
    },
    {
      "cve": "CVE-2020-11984",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11984"
    },
    {
      "cve": "CVE-2020-11993",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11993"
    },
    {
      "cve": "CVE-2020-12362",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12362"
    },
    {
      "cve": "CVE-2020-12400",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12400"
    },
    {
      "cve": "CVE-2020-12401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12401"
    },
    {
      "cve": "CVE-2020-12402",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12402"
    },
    {
      "cve": "CVE-2020-12403",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12403"
    },
    {
      "cve": "CVE-2020-13938",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13938"
    },
    {
      "cve": "CVE-2020-13950",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13950"
    },
    {
      "cve": "CVE-2020-14145",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-14145"
    },
    {
      "cve": "CVE-2020-15861",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15861"
    },
    {
      "cve": "CVE-2020-15862",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15862"
    },
    {
      "cve": "CVE-2020-1927",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1927"
    },
    {
      "cve": "CVE-2020-1934",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1934"
    },
    {
      "cve": "CVE-2020-28469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28469"
    },
    {
      "cve": "CVE-2020-28502",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28502"
    },
    {
      "cve": "CVE-2020-35452",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-35452"
    },
    {
      "cve": "CVE-2020-36049",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-36049"
    },
    {
      "cve": "CVE-2020-6829",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-6829"
    },
    {
      "cve": "CVE-2020-7660",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7660"
    },
    {
      "cve": "CVE-2020-7754",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7754"
    },
    {
      "cve": "CVE-2020-7774",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7774"
    },
    {
      "cve": "CVE-2020-8648",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-9490",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-9490"
    },
    {
      "cve": "CVE-2021-22543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-2342",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2342"
    },
    {
      "cve": "CVE-2021-23440",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-23440"
    },
    {
      "cve": "CVE-2021-2356",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2356"
    },
    {
      "cve": "CVE-2021-2372",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2372"
    },
    {
      "cve": "CVE-2021-2385",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2385"
    },
    {
      "cve": "CVE-2021-2389",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2389"
    },
    {
      "cve": "CVE-2021-2390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2390"
    },
    {
      "cve": "CVE-2021-25745",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25745"
    },
    {
      "cve": "CVE-2021-25746",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25746"
    },
    {
      "cve": "CVE-2021-25748",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25748"
    },
    {
      "cve": "CVE-2021-26690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26690"
    },
    {
      "cve": "CVE-2021-26691",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26691"
    },
    {
      "cve": "CVE-2021-27290",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-27290"
    },
    {
      "cve": "CVE-2021-29469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-29469"
    },
    {
      "cve": "CVE-2021-30641",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-30641"
    },
    {
      "cve": "CVE-2021-31535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31535"
    },
    {
      "cve": "CVE-2021-31618",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31618"
    },
    {
      "cve": "CVE-2021-3177",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3177"
    },
    {
      "cve": "CVE-2021-32803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32803"
    },
    {
      "cve": "CVE-2021-32804",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32804"
    },
    {
      "cve": "CVE-2021-33033",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-33034",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33034"
    },
    {
      "cve": "CVE-2021-33193",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33193"
    },
    {
      "cve": "CVE-2021-3347",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3347"
    },
    {
      "cve": "CVE-2021-33909",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-34798",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-35604",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35604"
    },
    {
      "cve": "CVE-2021-35624",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35624"
    },
    {
      "cve": "CVE-2021-36160",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-36160"
    },
    {
      "cve": "CVE-2021-37701",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37701"
    },
    {
      "cve": "CVE-2021-37712",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37712"
    },
    {
      "cve": "CVE-2021-37713",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37713"
    },
    {
      "cve": "CVE-2021-3803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3803"
    },
    {
      "cve": "CVE-2021-39275",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-40438"
    },
    {
      "cve": "CVE-2021-41524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41524"
    },
    {
      "cve": "CVE-2021-41773",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41773"
    },
    {
      "cve": "CVE-2021-42013",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-42013"
    },
    {
      "cve": "CVE-2021-43527",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-43527"
    },
    {
      "cve": "CVE-2021-44224",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44224"
    },
    {
      "cve": "CVE-2021-44225",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44225"
    },
    {
      "cve": "CVE-2021-44790",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44790"
    },
    {
      "cve": "CVE-2021-44906",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44906"
    },
    {
      "cve": "CVE-2022-21245",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21245"
    },
    {
      "cve": "CVE-2022-21270",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21270"
    },
    {
      "cve": "CVE-2022-21303",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21303"
    },
    {
      "cve": "CVE-2022-21304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21304"
    },
    {
      "cve": "CVE-2022-21344",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21344"
    },
    {
      "cve": "CVE-2022-21367",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21367"
    },
    {
      "cve": "CVE-2022-21417",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21417"
    },
    {
      "cve": "CVE-2022-21427",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21427"
    },
    {
      "cve": "CVE-2022-21444",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21444"
    },
    {
      "cve": "CVE-2022-21451",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21451"
    },
    {
      "cve": "CVE-2022-21454",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21454"
    },
    {
      "cve": "CVE-2022-21460",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21460"
    },
    {
      "cve": "CVE-2022-21589",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21589"
    },
    {
      "cve": "CVE-2022-21592",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21592"
    },
    {
      "cve": "CVE-2022-21595",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21595"
    },
    {
      "cve": "CVE-2022-21608",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21608"
    },
    {
      "cve": "CVE-2022-21617",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21617"
    },
    {
      "cve": "CVE-2022-22719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22719"
    },
    {
      "cve": "CVE-2022-22720",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22720"
    },
    {
      "cve": "CVE-2022-22721",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22721"
    },
    {
      "cve": "CVE-2022-22822",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-23471",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23471"
    },
    {
      "cve": "CVE-2022-23524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23524"
    },
    {
      "cve": "CVE-2022-23525",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23525"
    },
    {
      "cve": "CVE-2022-23526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23526"
    },
    {
      "cve": "CVE-2022-23852",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23943",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23943"
    },
    {
      "cve": "CVE-2022-25147",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25147"
    },
    {
      "cve": "CVE-2022-25235",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-2526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-2526"
    },
    {
      "cve": "CVE-2022-25315",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26377",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-26377"
    },
    {
      "cve": "CVE-2022-28330",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28330"
    },
    {
      "cve": "CVE-2022-28614",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28614"
    },
    {
      "cve": "CVE-2022-28615",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28615"
    },
    {
      "cve": "CVE-2022-29167",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29167"
    },
    {
      "cve": "CVE-2022-29404",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29404"
    },
    {
      "cve": "CVE-2022-30522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30522"
    },
    {
      "cve": "CVE-2022-30556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30556"
    },
    {
      "cve": "CVE-2022-31813",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-31813"
    },
    {
      "cve": "CVE-2022-3517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3517"
    },
    {
      "cve": "CVE-2022-3564",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3564"
    },
    {
      "cve": "CVE-2022-36760",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-36760"
    },
    {
      "cve": "CVE-2022-37434",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-37436",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37436"
    },
    {
      "cve": "CVE-2022-40674",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-40674"
    },
    {
      "cve": "CVE-2022-41741",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41741"
    },
    {
      "cve": "CVE-2022-41742",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41742"
    },
    {
      "cve": "CVE-2022-4203",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4203"
    },
    {
      "cve": "CVE-2022-4304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4304"
    },
    {
      "cve": "CVE-2022-4450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4450"
    },
    {
      "cve": "CVE-2022-46663",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-46663"
    },
    {
      "cve": "CVE-2022-4886",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4886"
    },
    {
      "cve": "CVE-2023-0215",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0215"
    },
    {
      "cve": "CVE-2023-0216",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0216"
    },
    {
      "cve": "CVE-2023-0217",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0217"
    },
    {
      "cve": "CVE-2023-0286",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0286"
    },
    {
      "cve": "CVE-2023-0401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0401"
    },
    {
      "cve": "CVE-2023-0464",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0464"
    },
    {
      "cve": "CVE-2023-0465",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0465"
    },
    {
      "cve": "CVE-2023-0466",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0466"
    },
    {
      "cve": "CVE-2023-0767",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0767"
    },
    {
      "cve": "CVE-2023-1255",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-1255"
    },
    {
      "cve": "CVE-2023-2002",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2002"
    },
    {
      "cve": "CVE-2023-20593",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-20593"
    },
    {
      "cve": "CVE-2023-21830",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21830"
    },
    {
      "cve": "CVE-2023-21840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21840"
    },
    {
      "cve": "CVE-2023-21843",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21843"
    },
    {
      "cve": "CVE-2023-21912",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21912"
    },
    {
      "cve": "CVE-2023-21963",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21963"
    },
    {
      "cve": "CVE-2023-21980",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21980"
    },
    {
      "cve": "CVE-2023-22025",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22025"
    },
    {
      "cve": "CVE-2023-22067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22067"
    },
    {
      "cve": "CVE-2023-22081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22081"
    },
    {
      "cve": "CVE-2023-22652",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22652"
    },
    {
      "cve": "CVE-2023-24329",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-25153",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25153"
    },
    {
      "cve": "CVE-2023-25173",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25173"
    },
    {
      "cve": "CVE-2023-25690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25690"
    },
    {
      "cve": "CVE-2023-2700",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2700"
    },
    {
      "cve": "CVE-2023-27522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-27522"
    },
    {
      "cve": "CVE-2023-2828",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2828"
    },
    {
      "cve": "CVE-2023-28840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28840"
    },
    {
      "cve": "CVE-2023-28841",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28841"
    },
    {
      "cve": "CVE-2023-28842",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28842"
    },
    {
      "cve": "CVE-2023-2975",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2975"
    },
    {
      "cve": "CVE-2023-30079",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30079"
    },
    {
      "cve": "CVE-2023-30630",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30630"
    },
    {
      "cve": "CVE-2023-3090",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3090"
    },
    {
      "cve": "CVE-2023-32067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32067"
    },
    {
      "cve": "CVE-2023-32360",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32360"
    },
    {
      "cve": "CVE-2023-32435",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32435"
    },
    {
      "cve": "CVE-2023-32439",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32439"
    },
    {
      "cve": "CVE-2023-32732",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32732"
    },
    {
      "cve": "CVE-2023-3341",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3341"
    },
    {
      "cve": "CVE-2023-3390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3390"
    },
    {
      "cve": "CVE-2023-33953",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-33953"
    },
    {
      "cve": "CVE-2023-34058",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34058"
    },
    {
      "cve": "CVE-2023-34059",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34059"
    },
    {
      "cve": "CVE-2023-3446",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-34969",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34969"
    },
    {
      "cve": "CVE-2023-35001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35001"
    },
    {
      "cve": "CVE-2023-35788",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35788"
    },
    {
      "cve": "CVE-2023-3611",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3611"
    },
    {
      "cve": "CVE-2023-37450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-37450"
    },
    {
      "cve": "CVE-2023-3776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3776"
    },
    {
      "cve": "CVE-2023-3817",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-4004",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4004"
    },
    {
      "cve": "CVE-2023-4206",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4206"
    },
    {
      "cve": "CVE-2023-4207",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4207"
    },
    {
      "cve": "CVE-2023-4208",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4208"
    },
    {
      "cve": "CVE-2023-42753",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-42753"
    },
    {
      "cve": "CVE-2023-4785",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4785"
    },
    {
      "cve": "CVE-2023-4807",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4807"
    },
    {
      "cve": "CVE-2023-4863",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4863"
    },
    {
      "cve": "CVE-2023-5043",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5043"
    },
    {
      "cve": "CVE-2023-5129",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5129"
    },
    {
      "cve": "CVE-2023-5363",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2024-20918",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20918"
    },
    {
      "cve": "CVE-2024-20919",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20919"
    },
    {
      "cve": "CVE-2024-20921",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20921"
    },
    {
      "cve": "CVE-2024-20926",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20926"
    },
    {
      "cve": "CVE-2024-20932",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20932"
    },
    {
      "cve": "CVE-2024-20945",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20945"
    },
    {
      "cve": "CVE-2024-20952",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20952"
    },
    {
      "cve": "CVE-2024-39511",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39511"
    },
    {
      "cve": "CVE-2024-39512",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39512"
    },
    {
      "cve": "CVE-2024-39513",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39513"
    },
    {
      "cve": "CVE-2024-39514",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39514"
    },
    {
      "cve": "CVE-2024-39517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39517"
    },
    {
      "cve": "CVE-2024-39518",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39518"
    },
    {
      "cve": "CVE-2024-39519",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39519"
    },
    {
      "cve": "CVE-2024-39520",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39520"
    },
    {
      "cve": "CVE-2024-39521",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39521"
    },
    {
      "cve": "CVE-2024-39522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39522"
    },
    {
      "cve": "CVE-2024-39523",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39523"
    },
    {
      "cve": "CVE-2024-39524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39524"
    },
    {
      "cve": "CVE-2024-39528",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39528"
    },
    {
      "cve": "CVE-2024-39529",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39529"
    },
    {
      "cve": "CVE-2024-39530",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39530"
    },
    {
      "cve": "CVE-2024-39531",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39531"
    },
    {
      "cve": "CVE-2024-39532",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39532"
    },
    {
      "cve": "CVE-2024-39533",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39533"
    },
    {
      "cve": "CVE-2024-39535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39535"
    },
    {
      "cve": "CVE-2024-39536",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39536"
    },
    {
      "cve": "CVE-2024-39537",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39537"
    },
    {
      "cve": "CVE-2024-39538",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39538"
    },
    {
      "cve": "CVE-2024-39539",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39539"
    },
    {
      "cve": "CVE-2024-39540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39540"
    },
    {
      "cve": "CVE-2024-39541",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39541"
    },
    {
      "cve": "CVE-2024-39542",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39542"
    },
    {
      "cve": "CVE-2024-39543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39543"
    },
    {
      "cve": "CVE-2024-39545",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39545"
    },
    {
      "cve": "CVE-2024-39546",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39546"
    },
    {
      "cve": "CVE-2024-39548",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39548"
    },
    {
      "cve": "CVE-2024-39549",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39549"
    },
    {
      "cve": "CVE-2024-39550",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39550"
    },
    {
      "cve": "CVE-2024-39551",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39551"
    },
    {
      "cve": "CVE-2024-39553",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39553"
    },
    {
      "cve": "CVE-2024-39554",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39554"
    },
    {
      "cve": "CVE-2024-39555",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39555"
    },
    {
      "cve": "CVE-2024-39556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39556"
    },
    {
      "cve": "CVE-2024-39557",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39557"
    },
    {
      "cve": "CVE-2024-39558",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39558"
    },
    {
      "cve": "CVE-2024-39559",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39559"
    },
    {
      "cve": "CVE-2024-39560",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39560"
    },
    {
      "cve": "CVE-2024-39561",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39561"
    },
    {
      "cve": "CVE-2024-39565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39565"
    }
  ]
}
  WID-SEC-W-2024-0186
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "HPE OneView bietet softwaredefinierte Analysen und eine einheitliche API f\u00fcr den Aufbau und die Verwaltung der IT-Infrastruktur.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in HPE OneView ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, um seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand zu verursachen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-0186 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0186.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-0186 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0186"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin vom 2024-01-23",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbgn04586en_us"
      },
      {
        "category": "external",
        "summary": "GitHub Advisory Database vom 2024-01-23",
        "url": "https://github.com/advisories/GHSA-hc66-p838-6xfp"
      },
      {
        "category": "external",
        "summary": "GitHub Advisory Database vom 2024-01-23",
        "url": "https://github.com/advisories/GHSA-xr6f-9r29-5gq3"
      },
      {
        "category": "external",
        "summary": "GitHub Advisory Database vom 2024-01-23",
        "url": "https://github.com/advisories/GHSA-xw8x-r2rg-vmq9"
      }
    ],
    "source_lang": "en-US",
    "title": "HPE OneView: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-01-23T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T18:04:13.418+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2024-0186",
      "initial_release_date": "2024-01-23T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-01-23T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HPE OneView \u003c 8.70",
            "product": {
              "name": "HPE OneView \u003c 8.70",
              "product_id": "T032304",
              "product_identification_helper": {
                "cpe": "cpe:/a:hp:oneview:8.70"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "notes": [
        {
          "category": "description",
          "text": "Es besteht eine Schwachstelle in HPE OneView. Dieser Fehler besteht aufgrund eines Server-Side Request Forgery-Problems. Ein entfernter, anonymer Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen."
        }
      ],
      "release_date": "2024-01-23T23:00:00.000+00:00",
      "title": "CVE-2021-40438"
    },
    {
      "cve": "CVE-2023-50274",
      "notes": [
        {
          "category": "description",
          "text": "Es besteht eine Schwachstelle in HPE OneView. Dieser Fehler besteht aufgrund einer Anf\u00e4lligkeit f\u00fcr einen Command-Injection-Angriff. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Berechtigungen zu erweitern."
        }
      ],
      "release_date": "2024-01-23T23:00:00.000+00:00",
      "title": "CVE-2023-50274"
    },
    {
      "cve": "CVE-2023-50275",
      "notes": [
        {
          "category": "description",
          "text": "Es besteht eine Schwachstelle in HPE OneView. Dieser Fehler besteht aufgrund eines der M\u00f6glichkeit zur Umgehung der Authentisierung im \"clusterService\",die es einem entfernten, anonymen Angreifer erm\u00f6glicht, einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "release_date": "2024-01-23T23:00:00.000+00:00",
      "title": "CVE-2023-50275"
    },
    {
      "cve": "CVE-2023-6573",
      "notes": [
        {
          "category": "description",
          "text": "Es besteht eine Schwachstelle in HPE OneView. Dieser Fehler besteht aufgrund einer fehlenden Passphrase w\u00e4hrend der Wiederherstellung. Ein Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
        }
      ],
      "release_date": "2024-01-23T23:00:00.000+00:00",
      "title": "CVE-2023-6573"
    }
  ]
}
  wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service  zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1591 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1591 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
      },
      {
        "category": "external",
        "summary": "Juniper Patchday July 2024 vom 2024-07-10",
        "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
      }
    ],
    "source_lang": "en-US",
    "title": "Juniper JUNOS: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-11-11T23:00:00.000+00:00",
      "generator": {
        "date": "2024-11-12T09:31:28.569+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-1591",
      "initial_release_date": "2024-07-10T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-07-10T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "2",
          "summary": "URL Kodierung angepasst"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Juniper JUNOS",
            "product": {
              "name": "Juniper JUNOS",
              "product_id": "T036093",
              "product_identification_helper": {
                "cpe": "cpe:/o:juniper:junos:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2006-20001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2006-20001"
    },
    {
      "cve": "CVE-2007-5846",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2007-5846"
    },
    {
      "cve": "CVE-2008-6123",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2008-6123"
    },
    {
      "cve": "CVE-2011-1473",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-1473"
    },
    {
      "cve": "CVE-2011-5094",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-5094"
    },
    {
      "cve": "CVE-2012-6151",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2012-6151"
    },
    {
      "cve": "CVE-2014-10064",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-10064"
    },
    {
      "cve": "CVE-2014-2285",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2285"
    },
    {
      "cve": "CVE-2014-2310",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2310"
    },
    {
      "cve": "CVE-2014-3565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-3565"
    },
    {
      "cve": "CVE-2014-7191",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-7191"
    },
    {
      "cve": "CVE-2014-8882",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-8882"
    },
    {
      "cve": "CVE-2015-5621",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-5621"
    },
    {
      "cve": "CVE-2015-8100",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-8100"
    },
    {
      "cve": "CVE-2015-9262",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-9262"
    },
    {
      "cve": "CVE-2016-1000232",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-1000232"
    },
    {
      "cve": "CVE-2016-10540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-10540"
    },
    {
      "cve": "CVE-2016-4658",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-4658"
    },
    {
      "cve": "CVE-2017-1000048",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-1000048"
    },
    {
      "cve": "CVE-2017-15010",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-15010"
    },
    {
      "cve": "CVE-2018-18065",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-18065"
    },
    {
      "cve": "CVE-2018-20834",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-20834"
    },
    {
      "cve": "CVE-2018-3737",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-3737"
    },
    {
      "cve": "CVE-2018-7408",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-7408"
    },
    {
      "cve": "CVE-2019-10081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10081"
    },
    {
      "cve": "CVE-2019-10082",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10082"
    },
    {
      "cve": "CVE-2019-10092",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10092"
    },
    {
      "cve": "CVE-2019-10097",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10097"
    },
    {
      "cve": "CVE-2019-10098",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10098"
    },
    {
      "cve": "CVE-2019-11719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11719"
    },
    {
      "cve": "CVE-2019-11727",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11727"
    },
    {
      "cve": "CVE-2019-11756",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11756"
    },
    {
      "cve": "CVE-2019-16775",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16775"
    },
    {
      "cve": "CVE-2019-16776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16776"
    },
    {
      "cve": "CVE-2019-16777",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16777"
    },
    {
      "cve": "CVE-2019-17006",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17006"
    },
    {
      "cve": "CVE-2019-17023",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17023"
    },
    {
      "cve": "CVE-2019-17567",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17567"
    },
    {
      "cve": "CVE-2019-20149",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20149"
    },
    {
      "cve": "CVE-2019-20892",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20892"
    },
    {
      "cve": "CVE-2019-9517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-9517"
    },
    {
      "cve": "CVE-2020-11668",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11668"
    },
    {
      "cve": "CVE-2020-11984",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11984"
    },
    {
      "cve": "CVE-2020-11993",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11993"
    },
    {
      "cve": "CVE-2020-12362",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12362"
    },
    {
      "cve": "CVE-2020-12400",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12400"
    },
    {
      "cve": "CVE-2020-12401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12401"
    },
    {
      "cve": "CVE-2020-12402",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12402"
    },
    {
      "cve": "CVE-2020-12403",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12403"
    },
    {
      "cve": "CVE-2020-13938",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13938"
    },
    {
      "cve": "CVE-2020-13950",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13950"
    },
    {
      "cve": "CVE-2020-14145",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-14145"
    },
    {
      "cve": "CVE-2020-15861",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15861"
    },
    {
      "cve": "CVE-2020-15862",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15862"
    },
    {
      "cve": "CVE-2020-1927",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1927"
    },
    {
      "cve": "CVE-2020-1934",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1934"
    },
    {
      "cve": "CVE-2020-28469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28469"
    },
    {
      "cve": "CVE-2020-28502",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28502"
    },
    {
      "cve": "CVE-2020-35452",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-35452"
    },
    {
      "cve": "CVE-2020-36049",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-36049"
    },
    {
      "cve": "CVE-2020-6829",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-6829"
    },
    {
      "cve": "CVE-2020-7660",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7660"
    },
    {
      "cve": "CVE-2020-7754",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7754"
    },
    {
      "cve": "CVE-2020-7774",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7774"
    },
    {
      "cve": "CVE-2020-8648",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-9490",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-9490"
    },
    {
      "cve": "CVE-2021-22543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-2342",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2342"
    },
    {
      "cve": "CVE-2021-23440",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-23440"
    },
    {
      "cve": "CVE-2021-2356",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2356"
    },
    {
      "cve": "CVE-2021-2372",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2372"
    },
    {
      "cve": "CVE-2021-2385",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2385"
    },
    {
      "cve": "CVE-2021-2389",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2389"
    },
    {
      "cve": "CVE-2021-2390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2390"
    },
    {
      "cve": "CVE-2021-25745",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25745"
    },
    {
      "cve": "CVE-2021-25746",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25746"
    },
    {
      "cve": "CVE-2021-25748",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25748"
    },
    {
      "cve": "CVE-2021-26690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26690"
    },
    {
      "cve": "CVE-2021-26691",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26691"
    },
    {
      "cve": "CVE-2021-27290",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-27290"
    },
    {
      "cve": "CVE-2021-29469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-29469"
    },
    {
      "cve": "CVE-2021-30641",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-30641"
    },
    {
      "cve": "CVE-2021-31535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31535"
    },
    {
      "cve": "CVE-2021-31618",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31618"
    },
    {
      "cve": "CVE-2021-3177",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3177"
    },
    {
      "cve": "CVE-2021-32803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32803"
    },
    {
      "cve": "CVE-2021-32804",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32804"
    },
    {
      "cve": "CVE-2021-33033",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-33034",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33034"
    },
    {
      "cve": "CVE-2021-33193",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33193"
    },
    {
      "cve": "CVE-2021-3347",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3347"
    },
    {
      "cve": "CVE-2021-33909",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-34798",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-35604",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35604"
    },
    {
      "cve": "CVE-2021-35624",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35624"
    },
    {
      "cve": "CVE-2021-36160",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-36160"
    },
    {
      "cve": "CVE-2021-37701",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37701"
    },
    {
      "cve": "CVE-2021-37712",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37712"
    },
    {
      "cve": "CVE-2021-37713",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37713"
    },
    {
      "cve": "CVE-2021-3803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3803"
    },
    {
      "cve": "CVE-2021-39275",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-40438"
    },
    {
      "cve": "CVE-2021-41524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41524"
    },
    {
      "cve": "CVE-2021-41773",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41773"
    },
    {
      "cve": "CVE-2021-42013",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-42013"
    },
    {
      "cve": "CVE-2021-43527",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-43527"
    },
    {
      "cve": "CVE-2021-44224",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44224"
    },
    {
      "cve": "CVE-2021-44225",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44225"
    },
    {
      "cve": "CVE-2021-44790",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44790"
    },
    {
      "cve": "CVE-2021-44906",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44906"
    },
    {
      "cve": "CVE-2022-21245",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21245"
    },
    {
      "cve": "CVE-2022-21270",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21270"
    },
    {
      "cve": "CVE-2022-21303",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21303"
    },
    {
      "cve": "CVE-2022-21304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21304"
    },
    {
      "cve": "CVE-2022-21344",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21344"
    },
    {
      "cve": "CVE-2022-21367",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21367"
    },
    {
      "cve": "CVE-2022-21417",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21417"
    },
    {
      "cve": "CVE-2022-21427",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21427"
    },
    {
      "cve": "CVE-2022-21444",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21444"
    },
    {
      "cve": "CVE-2022-21451",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21451"
    },
    {
      "cve": "CVE-2022-21454",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21454"
    },
    {
      "cve": "CVE-2022-21460",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21460"
    },
    {
      "cve": "CVE-2022-21589",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21589"
    },
    {
      "cve": "CVE-2022-21592",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21592"
    },
    {
      "cve": "CVE-2022-21595",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21595"
    },
    {
      "cve": "CVE-2022-21608",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21608"
    },
    {
      "cve": "CVE-2022-21617",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21617"
    },
    {
      "cve": "CVE-2022-22719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22719"
    },
    {
      "cve": "CVE-2022-22720",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22720"
    },
    {
      "cve": "CVE-2022-22721",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22721"
    },
    {
      "cve": "CVE-2022-22822",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-23471",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23471"
    },
    {
      "cve": "CVE-2022-23524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23524"
    },
    {
      "cve": "CVE-2022-23525",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23525"
    },
    {
      "cve": "CVE-2022-23526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23526"
    },
    {
      "cve": "CVE-2022-23852",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23943",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23943"
    },
    {
      "cve": "CVE-2022-25147",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25147"
    },
    {
      "cve": "CVE-2022-25235",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-2526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-2526"
    },
    {
      "cve": "CVE-2022-25315",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26377",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-26377"
    },
    {
      "cve": "CVE-2022-28330",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28330"
    },
    {
      "cve": "CVE-2022-28614",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28614"
    },
    {
      "cve": "CVE-2022-28615",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28615"
    },
    {
      "cve": "CVE-2022-29167",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29167"
    },
    {
      "cve": "CVE-2022-29404",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29404"
    },
    {
      "cve": "CVE-2022-30522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30522"
    },
    {
      "cve": "CVE-2022-30556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30556"
    },
    {
      "cve": "CVE-2022-31813",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-31813"
    },
    {
      "cve": "CVE-2022-3517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3517"
    },
    {
      "cve": "CVE-2022-3564",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3564"
    },
    {
      "cve": "CVE-2022-36760",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-36760"
    },
    {
      "cve": "CVE-2022-37434",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-37436",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37436"
    },
    {
      "cve": "CVE-2022-40674",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-40674"
    },
    {
      "cve": "CVE-2022-41741",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41741"
    },
    {
      "cve": "CVE-2022-41742",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41742"
    },
    {
      "cve": "CVE-2022-4203",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4203"
    },
    {
      "cve": "CVE-2022-4304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4304"
    },
    {
      "cve": "CVE-2022-4450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4450"
    },
    {
      "cve": "CVE-2022-46663",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-46663"
    },
    {
      "cve": "CVE-2022-4886",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4886"
    },
    {
      "cve": "CVE-2023-0215",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0215"
    },
    {
      "cve": "CVE-2023-0216",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0216"
    },
    {
      "cve": "CVE-2023-0217",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0217"
    },
    {
      "cve": "CVE-2023-0286",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0286"
    },
    {
      "cve": "CVE-2023-0401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0401"
    },
    {
      "cve": "CVE-2023-0464",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0464"
    },
    {
      "cve": "CVE-2023-0465",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0465"
    },
    {
      "cve": "CVE-2023-0466",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0466"
    },
    {
      "cve": "CVE-2023-0767",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0767"
    },
    {
      "cve": "CVE-2023-1255",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-1255"
    },
    {
      "cve": "CVE-2023-2002",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2002"
    },
    {
      "cve": "CVE-2023-20593",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-20593"
    },
    {
      "cve": "CVE-2023-21830",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21830"
    },
    {
      "cve": "CVE-2023-21840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21840"
    },
    {
      "cve": "CVE-2023-21843",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21843"
    },
    {
      "cve": "CVE-2023-21912",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21912"
    },
    {
      "cve": "CVE-2023-21963",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21963"
    },
    {
      "cve": "CVE-2023-21980",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21980"
    },
    {
      "cve": "CVE-2023-22025",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22025"
    },
    {
      "cve": "CVE-2023-22067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22067"
    },
    {
      "cve": "CVE-2023-22081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22081"
    },
    {
      "cve": "CVE-2023-22652",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22652"
    },
    {
      "cve": "CVE-2023-24329",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-25153",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25153"
    },
    {
      "cve": "CVE-2023-25173",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25173"
    },
    {
      "cve": "CVE-2023-25690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25690"
    },
    {
      "cve": "CVE-2023-2700",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2700"
    },
    {
      "cve": "CVE-2023-27522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-27522"
    },
    {
      "cve": "CVE-2023-2828",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2828"
    },
    {
      "cve": "CVE-2023-28840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28840"
    },
    {
      "cve": "CVE-2023-28841",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28841"
    },
    {
      "cve": "CVE-2023-28842",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28842"
    },
    {
      "cve": "CVE-2023-2975",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2975"
    },
    {
      "cve": "CVE-2023-30079",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30079"
    },
    {
      "cve": "CVE-2023-30630",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30630"
    },
    {
      "cve": "CVE-2023-3090",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3090"
    },
    {
      "cve": "CVE-2023-32067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32067"
    },
    {
      "cve": "CVE-2023-32360",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32360"
    },
    {
      "cve": "CVE-2023-32435",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32435"
    },
    {
      "cve": "CVE-2023-32439",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32439"
    },
    {
      "cve": "CVE-2023-32732",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32732"
    },
    {
      "cve": "CVE-2023-3341",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3341"
    },
    {
      "cve": "CVE-2023-3390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3390"
    },
    {
      "cve": "CVE-2023-33953",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-33953"
    },
    {
      "cve": "CVE-2023-34058",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34058"
    },
    {
      "cve": "CVE-2023-34059",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34059"
    },
    {
      "cve": "CVE-2023-3446",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-34969",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34969"
    },
    {
      "cve": "CVE-2023-35001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35001"
    },
    {
      "cve": "CVE-2023-35788",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35788"
    },
    {
      "cve": "CVE-2023-3611",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3611"
    },
    {
      "cve": "CVE-2023-37450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-37450"
    },
    {
      "cve": "CVE-2023-3776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3776"
    },
    {
      "cve": "CVE-2023-3817",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-4004",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4004"
    },
    {
      "cve": "CVE-2023-4206",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4206"
    },
    {
      "cve": "CVE-2023-4207",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4207"
    },
    {
      "cve": "CVE-2023-4208",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4208"
    },
    {
      "cve": "CVE-2023-42753",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-42753"
    },
    {
      "cve": "CVE-2023-4785",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4785"
    },
    {
      "cve": "CVE-2023-4807",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4807"
    },
    {
      "cve": "CVE-2023-4863",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4863"
    },
    {
      "cve": "CVE-2023-5043",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5043"
    },
    {
      "cve": "CVE-2023-5129",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5129"
    },
    {
      "cve": "CVE-2023-5363",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2024-20918",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20918"
    },
    {
      "cve": "CVE-2024-20919",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20919"
    },
    {
      "cve": "CVE-2024-20921",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20921"
    },
    {
      "cve": "CVE-2024-20926",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20926"
    },
    {
      "cve": "CVE-2024-20932",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20932"
    },
    {
      "cve": "CVE-2024-20945",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20945"
    },
    {
      "cve": "CVE-2024-20952",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20952"
    },
    {
      "cve": "CVE-2024-39511",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39511"
    },
    {
      "cve": "CVE-2024-39512",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39512"
    },
    {
      "cve": "CVE-2024-39513",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39513"
    },
    {
      "cve": "CVE-2024-39514",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39514"
    },
    {
      "cve": "CVE-2024-39517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39517"
    },
    {
      "cve": "CVE-2024-39518",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39518"
    },
    {
      "cve": "CVE-2024-39519",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39519"
    },
    {
      "cve": "CVE-2024-39520",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39520"
    },
    {
      "cve": "CVE-2024-39521",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39521"
    },
    {
      "cve": "CVE-2024-39522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39522"
    },
    {
      "cve": "CVE-2024-39523",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39523"
    },
    {
      "cve": "CVE-2024-39524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39524"
    },
    {
      "cve": "CVE-2024-39528",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39528"
    },
    {
      "cve": "CVE-2024-39529",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39529"
    },
    {
      "cve": "CVE-2024-39530",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39530"
    },
    {
      "cve": "CVE-2024-39531",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39531"
    },
    {
      "cve": "CVE-2024-39532",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39532"
    },
    {
      "cve": "CVE-2024-39533",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39533"
    },
    {
      "cve": "CVE-2024-39535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39535"
    },
    {
      "cve": "CVE-2024-39536",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39536"
    },
    {
      "cve": "CVE-2024-39537",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39537"
    },
    {
      "cve": "CVE-2024-39538",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39538"
    },
    {
      "cve": "CVE-2024-39539",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39539"
    },
    {
      "cve": "CVE-2024-39540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39540"
    },
    {
      "cve": "CVE-2024-39541",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39541"
    },
    {
      "cve": "CVE-2024-39542",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39542"
    },
    {
      "cve": "CVE-2024-39543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39543"
    },
    {
      "cve": "CVE-2024-39545",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39545"
    },
    {
      "cve": "CVE-2024-39546",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39546"
    },
    {
      "cve": "CVE-2024-39548",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39548"
    },
    {
      "cve": "CVE-2024-39549",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39549"
    },
    {
      "cve": "CVE-2024-39550",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39550"
    },
    {
      "cve": "CVE-2024-39551",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39551"
    },
    {
      "cve": "CVE-2024-39553",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39553"
    },
    {
      "cve": "CVE-2024-39554",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39554"
    },
    {
      "cve": "CVE-2024-39555",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39555"
    },
    {
      "cve": "CVE-2024-39556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39556"
    },
    {
      "cve": "CVE-2024-39557",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39557"
    },
    {
      "cve": "CVE-2024-39558",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39558"
    },
    {
      "cve": "CVE-2024-39559",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39559"
    },
    {
      "cve": "CVE-2024-39560",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39560"
    },
    {
      "cve": "CVE-2024-39561",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39561"
    },
    {
      "cve": "CVE-2024-39565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39565"
    }
  ]
}
  wid-sec-w-2024-0186
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "HPE OneView bietet softwaredefinierte Analysen und eine einheitliche API f\u00fcr den Aufbau und die Verwaltung der IT-Infrastruktur.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in HPE OneView ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, um seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand zu verursachen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-0186 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0186.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-0186 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0186"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin vom 2024-01-23",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbgn04586en_us"
      },
      {
        "category": "external",
        "summary": "GitHub Advisory Database vom 2024-01-23",
        "url": "https://github.com/advisories/GHSA-hc66-p838-6xfp"
      },
      {
        "category": "external",
        "summary": "GitHub Advisory Database vom 2024-01-23",
        "url": "https://github.com/advisories/GHSA-xr6f-9r29-5gq3"
      },
      {
        "category": "external",
        "summary": "GitHub Advisory Database vom 2024-01-23",
        "url": "https://github.com/advisories/GHSA-xw8x-r2rg-vmq9"
      }
    ],
    "source_lang": "en-US",
    "title": "HPE OneView: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-01-23T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T18:04:13.418+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2024-0186",
      "initial_release_date": "2024-01-23T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-01-23T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HPE OneView \u003c 8.70",
            "product": {
              "name": "HPE OneView \u003c 8.70",
              "product_id": "T032304",
              "product_identification_helper": {
                "cpe": "cpe:/a:hp:oneview:8.70"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "notes": [
        {
          "category": "description",
          "text": "Es besteht eine Schwachstelle in HPE OneView. Dieser Fehler besteht aufgrund eines Server-Side Request Forgery-Problems. Ein entfernter, anonymer Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen."
        }
      ],
      "release_date": "2024-01-23T23:00:00.000+00:00",
      "title": "CVE-2021-40438"
    },
    {
      "cve": "CVE-2023-50274",
      "notes": [
        {
          "category": "description",
          "text": "Es besteht eine Schwachstelle in HPE OneView. Dieser Fehler besteht aufgrund einer Anf\u00e4lligkeit f\u00fcr einen Command-Injection-Angriff. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Berechtigungen zu erweitern."
        }
      ],
      "release_date": "2024-01-23T23:00:00.000+00:00",
      "title": "CVE-2023-50274"
    },
    {
      "cve": "CVE-2023-50275",
      "notes": [
        {
          "category": "description",
          "text": "Es besteht eine Schwachstelle in HPE OneView. Dieser Fehler besteht aufgrund eines der M\u00f6glichkeit zur Umgehung der Authentisierung im \"clusterService\",die es einem entfernten, anonymen Angreifer erm\u00f6glicht, einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "release_date": "2024-01-23T23:00:00.000+00:00",
      "title": "CVE-2023-50275"
    },
    {
      "cve": "CVE-2023-6573",
      "notes": [
        {
          "category": "description",
          "text": "Es besteht eine Schwachstelle in HPE OneView. Dieser Fehler besteht aufgrund einer fehlenden Passphrase w\u00e4hrend der Wiederherstellung. Ein Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
        }
      ],
      "release_date": "2024-01-23T23:00:00.000+00:00",
      "title": "CVE-2023-6573"
    }
  ]
}
  wid-sec-w-2022-0724
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um Sicherheitsvorkehrungen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial of Service Zustand herzustellen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- UNIX\n- Linux\n- Windows\n- CISCO Appliance\n- F5 Networks\n- Sonstiges\n- Hardware Appliance",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0724 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0724.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0724 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0724"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K72382141 vom 2023-08-17",
        "url": "https://my.f5.com/manage/s/article/K72382141"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:4537 vom 2021-11-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:4537"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3522-1 vom 2021-10-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html"
      },
      {
        "category": "external",
        "summary": "Apache Security Advisory vom 2021-09-16",
        "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5090-1 vom 2021-09-27",
        "url": "https://ubuntu.com/security/notices/USN-5090-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5090-2 vom 2021-09-27",
        "url": "https://ubuntu.com/security/notices/USN-5090-2"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:14811-1 vom 2021-09-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009511.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5090-3 vom 2021-09-28",
        "url": "https://ubuntu.com/security/notices/USN-5090-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5090-4 vom 2021-09-28",
        "url": "https://ubuntu.com/security/notices/USN-5090-4"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2768 vom 2021-09-30",
        "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2776 vom 2021-10-02",
        "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3299-1 vom 2021-10-06",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3745 vom 2021-10-07",
        "url": "https://access.redhat.com/errata/RHSA-2021:3745"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3746 vom 2021-10-07",
        "url": "https://access.redhat.com/errata/RHSA-2021:3746"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4982 vom 2021-10-10",
        "url": "https://www.debian.org/security/2021/dsa-4982"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3754 vom 2021-10-11",
        "url": "https://access.redhat.com/errata/RHSA-2021:3754"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3335-1 vom 2021-10-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K72382141 vom 2021-10-13",
        "url": "https://support.f5.com/csp/article/K72382141?utm_source=f5support\u0026utm_medium=RSS"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3816 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3816"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3837 vom 2021-10-13",
        "url": "https://access.redhat.com/errata/RHSA-2021:3837"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3836 vom 2021-10-13",
        "url": "https://access.redhat.com/errata/RHSA-2021:3836"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3816 vom 2021-10-13",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3816.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3856 vom 2021-10-14",
        "url": "https://access.redhat.com/errata/RHSA-2021:3856"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3856 vom 2021-10-15",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3856.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2021-119 vom 2021-10-15",
        "url": "https://downloads.avaya.com/css/P8/documents/101078189"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1543 vom 2021-10-15",
        "url": "https://alas.aws.amazon.com/ALAS-2021-1543.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1716 vom 2021-10-15",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1716.html"
      },
      {
        "category": "external",
        "summary": "Hitachi Vulnerability Information HITACHI-SEC-2021-139 vom 2021-11-12",
        "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2021-139/index.html"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2021:3856 vom 2021-11-17",
        "url": "https://lists.centos.org/pipermail/centos-announce/2021-November/048391.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-4537 vom 2021-11-18",
        "url": "https://linux.oracle.com/errata/ELSA-2021-4537.html"
      },
      {
        "category": "external",
        "summary": "Cisco Security Advisory CISCO-SA-APACHE-HTTPD-2 vom 2021-11-24",
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
      },
      {
        "category": "external",
        "summary": "Security Affairs vom 2021-11-29",
        "url": "https://securityaffairs.co/wordpress/125107/hacking/cve-2021-40438-apache-http-server-attacks.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9619 vom 2021-12-16",
        "url": "http://linux.oracle.com/errata/ELSA-2021-9619.html"
      },
      {
        "category": "external",
        "summary": "Cisco Security Advisory CISCO-SA-APACHE-HTTPD-2.4.49-VWL69SWQ vom 2021-12-21",
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
      },
      {
        "category": "external",
        "summary": "NetApp Security Advisory NTAP-20211008-0004 vom 2021-12-22",
        "url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-9005 vom 2022-01-06",
        "url": "https://linux.oracle.com/errata/ELSA-2022-9005.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0143 vom 2022-01-17",
        "url": "https://access.redhat.com/errata/RHSA-2022:0143"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-0143 vom 2022-01-19",
        "url": "http://linux.oracle.com/errata/ELSA-2022-0143.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-0258 vom 2022-01-26",
        "url": "http://linux.oracle.com/errata/ELSA-2022-0258.html"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2022:0143 vom 2022-01-25",
        "url": "https://lists.centos.org/pipermail/centos-announce/2022-January/073551.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2022-003 vom 2027-01-18",
        "url": "https://downloads.avaya.com/css/P8/documents/101079910"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-1915 vom 2022-05-17",
        "url": "https://linux.oracle.com/errata/ELSA-2022-1915.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0891 vom 2022-03-15",
        "url": "https://access.redhat.com/errata/RHSA-2022:0891"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-0891 vom 2022-03-16",
        "url": "http://linux.oracle.com/errata/ELSA-2022-0891.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2022-029 vom 2022-03-15",
        "url": "https://downloads.avaya.com/css/P8/documents/101080898"
      },
      {
        "category": "external",
        "summary": "HCL Article KB0097639 vom 2022-04-23",
        "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0097639"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:1915 vom 2022-05-10",
        "url": "https://access.redhat.com/errata/RHSA-2022:1915"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2022-053 vom 2022-07-18",
        "url": "https://downloads.avaya.com/css/P8/documents/101082704"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202208-20 vom 2022-08-14",
        "url": "https://security.gentoo.org/glsa/202208-20"
      },
      {
        "category": "external",
        "summary": "Brocade Security Advisory BSA-2022-1599 vom 2022-09-14",
        "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1599"
      },
      {
        "category": "external",
        "summary": "Brocade Security Advisory BSA-2022-1597 vom 2022-09-14",
        "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1597"
      },
      {
        "category": "external",
        "summary": "HPE SECURITY BULLETIN HPESBST04367 rev.1 vom 2022-09-21",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04367en_us"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:6753 vom 2022-09-29",
        "url": "https://access.redhat.com/errata/RHSA-2022:6753"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:7143 vom 2022-10-27",
        "url": "https://access.redhat.com/errata/RHSA-2022:7143"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:7144 vom 2022-10-27",
        "url": "https://access.redhat.com/errata/RHSA-2022:7144"
      }
    ],
    "source_lang": "en-US",
    "title": "Apache HTTP Server: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2023-08-17T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:31:51.898+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-0724",
      "initial_release_date": "2021-09-16T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2021-09-16T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2021-09-20T22:00:00.000+00:00",
          "number": "2",
          "summary": "Korrektur"
        },
        {
          "date": "2021-09-27T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
        },
        {
          "date": "2021-09-28T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-29T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-10-03T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-10-06T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-10-07T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-10T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-10-12T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von SUSE, F5 und Red Hat aufgenommen"
        },
        {
          "date": "2021-10-13T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2021-10-14T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-10-17T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von AVAYA und Amazon aufgenommen"
        },
        {
          "date": "2021-10-26T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-11-09T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-11-11T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von HITACHI aufgenommen"
        },
        {
          "date": "2021-11-17T23:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2021-11-18T23:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-11-24T23:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Cisco aufgenommen"
        },
        {
          "date": "2021-11-29T23:00:00.000+00:00",
          "number": "20",
          "summary": "Exploit aufgenommen"
        },
        {
          "date": "2021-12-15T23:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-12-20T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Cisco aufgenommen"
        },
        {
          "date": "2021-12-22T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von NetApp aufgenommen"
        },
        {
          "date": "2022-01-05T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-01-16T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-01-19T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-01-25T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Oracle Linux und CentOS aufgenommen"
        },
        {
          "date": "2022-01-27T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von AVAYA aufgenommen"
        },
        {
          "date": "2022-03-15T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-03-16T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Oracle Linux und AVAYA aufgenommen"
        },
        {
          "date": "2022-04-24T22:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von HCL aufgenommen"
        },
        {
          "date": "2022-05-10T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-05-17T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-07-19T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von AVAYA aufgenommen"
        },
        {
          "date": "2022-08-14T22:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Gentoo aufgenommen"
        },
        {
          "date": "2022-09-13T22:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von BROCADE aufgenommen"
        },
        {
          "date": "2022-09-20T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2022-09-29T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-10-26T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-13T22:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2023-08-17T22:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von F5 aufgenommen"
        }
      ],
      "status": "final",
      "version": "41"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Apache HTTP Server \u003c 2.4.49",
            "product": {
              "name": "Apache HTTP Server \u003c 2.4.49",
              "product_id": "67869",
              "product_identification_helper": {
                "cpe": "cpe:/a:apache:http_server:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Apache"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Avaya Aura Application Enablement Services",
            "product": {
              "name": "Avaya Aura Application Enablement Services",
              "product_id": "T015516",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_application_enablement_services:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Communication Manager",
            "product": {
              "name": "Avaya Aura Communication Manager",
              "product_id": "T015126",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:communication_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Experience Portal",
            "product": {
              "name": "Avaya Aura Experience Portal",
              "product_id": "T015519",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_experience_portal:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Session Manager",
            "product": {
              "name": "Avaya Aura Session Manager",
              "product_id": "T015127",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:session_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura System Manager",
            "product": {
              "name": "Avaya Aura System Manager",
              "product_id": "T015518",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_system_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Web License Manager",
            "product": {
              "name": "Avaya Web License Manager",
              "product_id": "T016243",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:web_license_manager:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Avaya"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Broadcom Brocade Switch",
            "product": {
              "name": "Broadcom Brocade Switch",
              "product_id": "T015844",
              "product_identification_helper": {
                "cpe": "cpe:/h:brocade:switch:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Broadcom"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Cisco Expressway",
            "product": {
              "name": "Cisco Expressway",
              "product_id": "T014329",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:expressway_software:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco FXOS",
            "product": {
              "name": "Cisco FXOS",
              "product_id": "660564",
              "product_identification_helper": {
                "cpe": "cpe:/o:cisco:fxos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Firepower",
            "product": {
              "name": "Cisco Firepower",
              "product_id": "T011337",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:firepower:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Prime Collaboration Provisioning",
            "product": {
              "name": "Cisco Prime Collaboration Provisioning",
              "product_id": "T021406",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:prime_collaboration:::provisioning"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Prime Infrastructure",
            "product": {
              "name": "Cisco Prime Infrastructure",
              "product_id": "T000756",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:prime_infrastructure:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Security Manager (CSM)",
            "product": {
              "name": "Cisco Security Manager (CSM)",
              "product_id": "95918",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:security_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco TelePresence Video Communication Server",
            "product": {
              "name": "Cisco TelePresence Video Communication Server",
              "product_id": "T018121",
              "product_identification_helper": {
                "cpe": "cpe:/h:cisco:telepresence:video_communication_server"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Unified Computing System (UCS)",
            "product": {
              "name": "Cisco Unified Computing System (UCS)",
              "product_id": "163824",
              "product_identification_helper": {
                "cpe": "cpe:/h:cisco:unified_computing_system:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Wide Area Application Services",
            "product": {
              "name": "Cisco Wide Area Application Services",
              "product_id": "2186",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:wide_area_application_services:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Cisco"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "F5 BIG-IP",
                "product": {
                  "name": "F5 BIG-IP",
                  "product_id": "T001663",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:f5:big-ip:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "F5 BIG-IP \u003c 17.0.0",
                "product": {
                  "name": "F5 BIG-IP \u003c 17.0.0",
                  "product_id": "T025087",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:f5:big-ip:17.0.0"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "F5 BIG-IP \u003c 15.1.7",
                "product": {
                  "name": "F5 BIG-IP \u003c 15.1.7",
                  "product_id": "T026110",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:f5:big-ip:15.1.7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "F5 BIG-IP \u003c 16.1.4",
                "product": {
                  "name": "F5 BIG-IP \u003c 16.1.4",
                  "product_id": "T029403",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:f5:big-ip:16.1.4"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP"
          }
        ],
        "category": "vendor",
        "name": "F5"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HPE Fabric OS",
            "product": {
              "name": "HPE Fabric OS",
              "product_id": "T019403",
              "product_identification_helper": {
                "cpe": "cpe:/o:hpe:fabric_os:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "HPE Switch",
            "product": {
              "name": "HPE Switch",
              "product_id": "T005119",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:switch:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Hitachi Command Suite",
            "product": {
              "name": "Hitachi Command Suite",
              "product_id": "T010951",
              "product_identification_helper": {
                "cpe": "cpe:/a:hitachi:command_suite:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Hitachi Configuration Manager",
            "product": {
              "name": "Hitachi Configuration Manager",
              "product_id": "T020304",
              "product_identification_helper": {
                "cpe": "cpe:/a:hitachi:configuration_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Hitachi Ops Center",
            "product": {
              "name": "Hitachi Ops Center",
              "product_id": "T017562",
              "product_identification_helper": {
                "cpe": "cpe:/a:hitachi:ops_center:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Hitachi"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "NetApp Data ONTAP",
            "product": {
              "name": "NetApp Data ONTAP",
              "product_id": "7654",
              "product_identification_helper": {
                "cpe": "cpe:/a:netapp:data_ontap:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "NetApp StorageGRID",
            "product": {
              "name": "NetApp StorageGRID",
              "product_id": "920206",
              "product_identification_helper": {
                "cpe": "cpe:/a:netapp:storagegrid:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "NetApp"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "notes": [
        {
          "category": "description",
          "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T010951",
          "T015844",
          "T015127",
          "T015126",
          "T004914",
          "T018121",
          "T000756",
          "T020304",
          "T001663",
          "398363",
          "163824",
          "T015519",
          "T015518",
          "T014329",
          "T015516",
          "T011337",
          "7654",
          "T005119",
          "2186",
          "T012167",
          "T016243",
          "T017562",
          "T019403",
          "2951",
          "T002207",
          "T021406",
          "T000126",
          "660564",
          "95918",
          "920206",
          "1727"
        ]
      },
      "release_date": "2021-09-16T22:00:00.000+00:00",
      "title": "CVE-2021-40438"
    },
    {
      "cve": "CVE-2021-39275",
      "notes": [
        {
          "category": "description",
          "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T010951",
          "T015844",
          "T015127",
          "T015126",
          "T004914",
          "T018121",
          "T000756",
          "T020304",
          "T001663",
          "398363",
          "163824",
          "T015519",
          "T015518",
          "T014329",
          "T015516",
          "T011337",
          "7654",
          "T005119",
          "2186",
          "T012167",
          "T016243",
          "T017562",
          "T019403",
          "2951",
          "T002207",
          "T021406",
          "T000126",
          "660564",
          "95918",
          "920206",
          "1727"
        ]
      },
      "release_date": "2021-09-16T22:00:00.000+00:00",
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-34798",
      "notes": [
        {
          "category": "description",
          "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T010951",
          "T015844",
          "T015127",
          "T015126",
          "T004914",
          "T018121",
          "T000756",
          "T020304",
          "T001663",
          "398363",
          "163824",
          "T015519",
          "T015518",
          "T014329",
          "T015516",
          "T011337",
          "7654",
          "T005119",
          "2186",
          "T012167",
          "T016243",
          "T017562",
          "T019403",
          "2951",
          "T002207",
          "T021406",
          "T000126",
          "660564",
          "95918",
          "920206",
          "1727"
        ]
      },
      "release_date": "2021-09-16T22:00:00.000+00:00",
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-20325",
      "notes": [
        {
          "category": "description",
          "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T010951",
          "T015844",
          "T015127",
          "T015126",
          "T004914",
          "T018121",
          "T000756",
          "T020304",
          "T001663",
          "398363",
          "163824",
          "T015519",
          "T015518",
          "T014329",
          "T015516",
          "T011337",
          "7654",
          "T005119",
          "2186",
          "T012167",
          "T016243",
          "T017562",
          "T019403",
          "2951",
          "T002207",
          "T021406",
          "T000126",
          "660564",
          "95918",
          "920206",
          "1727"
        ]
      },
      "release_date": "2021-09-16T22:00:00.000+00:00",
      "title": "CVE-2021-20325"
    },
    {
      "cve": "CVE-2021-36160",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund eines Out-of-Bound Read in \"mod_proxy_uwsgi\". Ein entfernter Angreifer kann diese Schwachstelle ausnutzen, um den zugewiesenen Speicher zu lesen und einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T010951",
          "T015844",
          "T015127",
          "T015126",
          "T004914",
          "T018121",
          "T000756",
          "T020304",
          "T001663",
          "398363",
          "163824",
          "T015519",
          "T015518",
          "T014329",
          "T015516",
          "T011337",
          "7654",
          "T005119",
          "2186",
          "T012167",
          "T016243",
          "T017562",
          "T019403",
          "2951",
          "T002207",
          "T021406",
          "T000126",
          "660564",
          "95918",
          "920206",
          "1727"
        ]
      },
      "release_date": "2021-09-16T22:00:00.000+00:00",
      "title": "CVE-2021-36160"
    }
  ]
}
  WID-SEC-W-2022-0724
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um Sicherheitsvorkehrungen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial of Service Zustand herzustellen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- UNIX\n- Linux\n- Windows\n- CISCO Appliance\n- F5 Networks\n- Sonstiges\n- Hardware Appliance",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0724 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0724.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0724 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0724"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K72382141 vom 2023-08-17",
        "url": "https://my.f5.com/manage/s/article/K72382141"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:4537 vom 2021-11-10",
        "url": "https://access.redhat.com/errata/RHSA-2021:4537"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3522-1 vom 2021-10-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html"
      },
      {
        "category": "external",
        "summary": "Apache Security Advisory vom 2021-09-16",
        "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5090-1 vom 2021-09-27",
        "url": "https://ubuntu.com/security/notices/USN-5090-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5090-2 vom 2021-09-27",
        "url": "https://ubuntu.com/security/notices/USN-5090-2"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:14811-1 vom 2021-09-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009511.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5090-3 vom 2021-09-28",
        "url": "https://ubuntu.com/security/notices/USN-5090-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5090-4 vom 2021-09-28",
        "url": "https://ubuntu.com/security/notices/USN-5090-4"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2768 vom 2021-09-30",
        "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2776 vom 2021-10-02",
        "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3299-1 vom 2021-10-06",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3745 vom 2021-10-07",
        "url": "https://access.redhat.com/errata/RHSA-2021:3745"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3746 vom 2021-10-07",
        "url": "https://access.redhat.com/errata/RHSA-2021:3746"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4982 vom 2021-10-10",
        "url": "https://www.debian.org/security/2021/dsa-4982"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3754 vom 2021-10-11",
        "url": "https://access.redhat.com/errata/RHSA-2021:3754"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3335-1 vom 2021-10-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K72382141 vom 2021-10-13",
        "url": "https://support.f5.com/csp/article/K72382141?utm_source=f5support\u0026utm_medium=RSS"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3816 vom 2021-10-12",
        "url": "https://access.redhat.com/errata/RHSA-2021:3816"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3837 vom 2021-10-13",
        "url": "https://access.redhat.com/errata/RHSA-2021:3837"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3836 vom 2021-10-13",
        "url": "https://access.redhat.com/errata/RHSA-2021:3836"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3816 vom 2021-10-13",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3816.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:3856 vom 2021-10-14",
        "url": "https://access.redhat.com/errata/RHSA-2021:3856"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-3856 vom 2021-10-15",
        "url": "http://linux.oracle.com/errata/ELSA-2021-3856.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2021-119 vom 2021-10-15",
        "url": "https://downloads.avaya.com/css/P8/documents/101078189"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1543 vom 2021-10-15",
        "url": "https://alas.aws.amazon.com/ALAS-2021-1543.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1716 vom 2021-10-15",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1716.html"
      },
      {
        "category": "external",
        "summary": "Hitachi Vulnerability Information HITACHI-SEC-2021-139 vom 2021-11-12",
        "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2021-139/index.html"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2021:3856 vom 2021-11-17",
        "url": "https://lists.centos.org/pipermail/centos-announce/2021-November/048391.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-4537 vom 2021-11-18",
        "url": "https://linux.oracle.com/errata/ELSA-2021-4537.html"
      },
      {
        "category": "external",
        "summary": "Cisco Security Advisory CISCO-SA-APACHE-HTTPD-2 vom 2021-11-24",
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
      },
      {
        "category": "external",
        "summary": "Security Affairs vom 2021-11-29",
        "url": "https://securityaffairs.co/wordpress/125107/hacking/cve-2021-40438-apache-http-server-attacks.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9619 vom 2021-12-16",
        "url": "http://linux.oracle.com/errata/ELSA-2021-9619.html"
      },
      {
        "category": "external",
        "summary": "Cisco Security Advisory CISCO-SA-APACHE-HTTPD-2.4.49-VWL69SWQ vom 2021-12-21",
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
      },
      {
        "category": "external",
        "summary": "NetApp Security Advisory NTAP-20211008-0004 vom 2021-12-22",
        "url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-9005 vom 2022-01-06",
        "url": "https://linux.oracle.com/errata/ELSA-2022-9005.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0143 vom 2022-01-17",
        "url": "https://access.redhat.com/errata/RHSA-2022:0143"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-0143 vom 2022-01-19",
        "url": "http://linux.oracle.com/errata/ELSA-2022-0143.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-0258 vom 2022-01-26",
        "url": "http://linux.oracle.com/errata/ELSA-2022-0258.html"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2022:0143 vom 2022-01-25",
        "url": "https://lists.centos.org/pipermail/centos-announce/2022-January/073551.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2022-003 vom 2027-01-18",
        "url": "https://downloads.avaya.com/css/P8/documents/101079910"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-1915 vom 2022-05-17",
        "url": "https://linux.oracle.com/errata/ELSA-2022-1915.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0891 vom 2022-03-15",
        "url": "https://access.redhat.com/errata/RHSA-2022:0891"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-0891 vom 2022-03-16",
        "url": "http://linux.oracle.com/errata/ELSA-2022-0891.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2022-029 vom 2022-03-15",
        "url": "https://downloads.avaya.com/css/P8/documents/101080898"
      },
      {
        "category": "external",
        "summary": "HCL Article KB0097639 vom 2022-04-23",
        "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0097639"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:1915 vom 2022-05-10",
        "url": "https://access.redhat.com/errata/RHSA-2022:1915"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2022-053 vom 2022-07-18",
        "url": "https://downloads.avaya.com/css/P8/documents/101082704"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202208-20 vom 2022-08-14",
        "url": "https://security.gentoo.org/glsa/202208-20"
      },
      {
        "category": "external",
        "summary": "Brocade Security Advisory BSA-2022-1599 vom 2022-09-14",
        "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1599"
      },
      {
        "category": "external",
        "summary": "Brocade Security Advisory BSA-2022-1597 vom 2022-09-14",
        "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1597"
      },
      {
        "category": "external",
        "summary": "HPE SECURITY BULLETIN HPESBST04367 rev.1 vom 2022-09-21",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04367en_us"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:6753 vom 2022-09-29",
        "url": "https://access.redhat.com/errata/RHSA-2022:6753"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:7143 vom 2022-10-27",
        "url": "https://access.redhat.com/errata/RHSA-2022:7143"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:7144 vom 2022-10-27",
        "url": "https://access.redhat.com/errata/RHSA-2022:7144"
      }
    ],
    "source_lang": "en-US",
    "title": "Apache HTTP Server: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2023-08-17T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:31:51.898+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-0724",
      "initial_release_date": "2021-09-16T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2021-09-16T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2021-09-20T22:00:00.000+00:00",
          "number": "2",
          "summary": "Korrektur"
        },
        {
          "date": "2021-09-27T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
        },
        {
          "date": "2021-09-28T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2021-09-29T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-10-03T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-10-06T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-10-07T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-10-10T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-10-12T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von SUSE, F5 und Red Hat aufgenommen"
        },
        {
          "date": "2021-10-13T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2021-10-14T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-10-17T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von AVAYA und Amazon aufgenommen"
        },
        {
          "date": "2021-10-26T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-11-09T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-11-11T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von HITACHI aufgenommen"
        },
        {
          "date": "2021-11-17T23:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2021-11-18T23:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-11-24T23:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Cisco aufgenommen"
        },
        {
          "date": "2021-11-29T23:00:00.000+00:00",
          "number": "20",
          "summary": "Exploit aufgenommen"
        },
        {
          "date": "2021-12-15T23:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-12-20T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Cisco aufgenommen"
        },
        {
          "date": "2021-12-22T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von NetApp aufgenommen"
        },
        {
          "date": "2022-01-05T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-01-16T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-01-19T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-01-25T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Oracle Linux und CentOS aufgenommen"
        },
        {
          "date": "2022-01-27T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von AVAYA aufgenommen"
        },
        {
          "date": "2022-03-15T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-03-16T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Oracle Linux und AVAYA aufgenommen"
        },
        {
          "date": "2022-04-24T22:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von HCL aufgenommen"
        },
        {
          "date": "2022-05-10T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-05-17T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-07-19T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von AVAYA aufgenommen"
        },
        {
          "date": "2022-08-14T22:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Gentoo aufgenommen"
        },
        {
          "date": "2022-09-13T22:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von BROCADE aufgenommen"
        },
        {
          "date": "2022-09-20T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2022-09-29T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-10-26T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-13T22:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2023-08-17T22:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von F5 aufgenommen"
        }
      ],
      "status": "final",
      "version": "41"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Apache HTTP Server \u003c 2.4.49",
            "product": {
              "name": "Apache HTTP Server \u003c 2.4.49",
              "product_id": "67869",
              "product_identification_helper": {
                "cpe": "cpe:/a:apache:http_server:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Apache"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Avaya Aura Application Enablement Services",
            "product": {
              "name": "Avaya Aura Application Enablement Services",
              "product_id": "T015516",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_application_enablement_services:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Communication Manager",
            "product": {
              "name": "Avaya Aura Communication Manager",
              "product_id": "T015126",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:communication_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Experience Portal",
            "product": {
              "name": "Avaya Aura Experience Portal",
              "product_id": "T015519",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_experience_portal:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Session Manager",
            "product": {
              "name": "Avaya Aura Session Manager",
              "product_id": "T015127",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:session_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura System Manager",
            "product": {
              "name": "Avaya Aura System Manager",
              "product_id": "T015518",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_system_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Web License Manager",
            "product": {
              "name": "Avaya Web License Manager",
              "product_id": "T016243",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:web_license_manager:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Avaya"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Broadcom Brocade Switch",
            "product": {
              "name": "Broadcom Brocade Switch",
              "product_id": "T015844",
              "product_identification_helper": {
                "cpe": "cpe:/h:brocade:switch:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Broadcom"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Cisco Expressway",
            "product": {
              "name": "Cisco Expressway",
              "product_id": "T014329",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:expressway_software:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco FXOS",
            "product": {
              "name": "Cisco FXOS",
              "product_id": "660564",
              "product_identification_helper": {
                "cpe": "cpe:/o:cisco:fxos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Firepower",
            "product": {
              "name": "Cisco Firepower",
              "product_id": "T011337",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:firepower:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Prime Collaboration Provisioning",
            "product": {
              "name": "Cisco Prime Collaboration Provisioning",
              "product_id": "T021406",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:prime_collaboration:::provisioning"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Prime Infrastructure",
            "product": {
              "name": "Cisco Prime Infrastructure",
              "product_id": "T000756",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:prime_infrastructure:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Security Manager (CSM)",
            "product": {
              "name": "Cisco Security Manager (CSM)",
              "product_id": "95918",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:security_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco TelePresence Video Communication Server",
            "product": {
              "name": "Cisco TelePresence Video Communication Server",
              "product_id": "T018121",
              "product_identification_helper": {
                "cpe": "cpe:/h:cisco:telepresence:video_communication_server"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Unified Computing System (UCS)",
            "product": {
              "name": "Cisco Unified Computing System (UCS)",
              "product_id": "163824",
              "product_identification_helper": {
                "cpe": "cpe:/h:cisco:unified_computing_system:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Wide Area Application Services",
            "product": {
              "name": "Cisco Wide Area Application Services",
              "product_id": "2186",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:wide_area_application_services:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Cisco"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "F5 BIG-IP",
                "product": {
                  "name": "F5 BIG-IP",
                  "product_id": "T001663",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:f5:big-ip:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "F5 BIG-IP \u003c 17.0.0",
                "product": {
                  "name": "F5 BIG-IP \u003c 17.0.0",
                  "product_id": "T025087",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:f5:big-ip:17.0.0"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "F5 BIG-IP \u003c 15.1.7",
                "product": {
                  "name": "F5 BIG-IP \u003c 15.1.7",
                  "product_id": "T026110",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:f5:big-ip:15.1.7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "F5 BIG-IP \u003c 16.1.4",
                "product": {
                  "name": "F5 BIG-IP \u003c 16.1.4",
                  "product_id": "T029403",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:f5:big-ip:16.1.4"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP"
          }
        ],
        "category": "vendor",
        "name": "F5"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HPE Fabric OS",
            "product": {
              "name": "HPE Fabric OS",
              "product_id": "T019403",
              "product_identification_helper": {
                "cpe": "cpe:/o:hpe:fabric_os:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "HPE Switch",
            "product": {
              "name": "HPE Switch",
              "product_id": "T005119",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:switch:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Hitachi Command Suite",
            "product": {
              "name": "Hitachi Command Suite",
              "product_id": "T010951",
              "product_identification_helper": {
                "cpe": "cpe:/a:hitachi:command_suite:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Hitachi Configuration Manager",
            "product": {
              "name": "Hitachi Configuration Manager",
              "product_id": "T020304",
              "product_identification_helper": {
                "cpe": "cpe:/a:hitachi:configuration_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Hitachi Ops Center",
            "product": {
              "name": "Hitachi Ops Center",
              "product_id": "T017562",
              "product_identification_helper": {
                "cpe": "cpe:/a:hitachi:ops_center:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Hitachi"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "NetApp Data ONTAP",
            "product": {
              "name": "NetApp Data ONTAP",
              "product_id": "7654",
              "product_identification_helper": {
                "cpe": "cpe:/a:netapp:data_ontap:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "NetApp StorageGRID",
            "product": {
              "name": "NetApp StorageGRID",
              "product_id": "920206",
              "product_identification_helper": {
                "cpe": "cpe:/a:netapp:storagegrid:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "NetApp"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "notes": [
        {
          "category": "description",
          "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T010951",
          "T015844",
          "T015127",
          "T015126",
          "T004914",
          "T018121",
          "T000756",
          "T020304",
          "T001663",
          "398363",
          "163824",
          "T015519",
          "T015518",
          "T014329",
          "T015516",
          "T011337",
          "7654",
          "T005119",
          "2186",
          "T012167",
          "T016243",
          "T017562",
          "T019403",
          "2951",
          "T002207",
          "T021406",
          "T000126",
          "660564",
          "95918",
          "920206",
          "1727"
        ]
      },
      "release_date": "2021-09-16T22:00:00.000+00:00",
      "title": "CVE-2021-40438"
    },
    {
      "cve": "CVE-2021-39275",
      "notes": [
        {
          "category": "description",
          "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T010951",
          "T015844",
          "T015127",
          "T015126",
          "T004914",
          "T018121",
          "T000756",
          "T020304",
          "T001663",
          "398363",
          "163824",
          "T015519",
          "T015518",
          "T014329",
          "T015516",
          "T011337",
          "7654",
          "T005119",
          "2186",
          "T012167",
          "T016243",
          "T017562",
          "T019403",
          "2951",
          "T002207",
          "T021406",
          "T000126",
          "660564",
          "95918",
          "920206",
          "1727"
        ]
      },
      "release_date": "2021-09-16T22:00:00.000+00:00",
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-34798",
      "notes": [
        {
          "category": "description",
          "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T010951",
          "T015844",
          "T015127",
          "T015126",
          "T004914",
          "T018121",
          "T000756",
          "T020304",
          "T001663",
          "398363",
          "163824",
          "T015519",
          "T015518",
          "T014329",
          "T015516",
          "T011337",
          "7654",
          "T005119",
          "2186",
          "T012167",
          "T016243",
          "T017562",
          "T019403",
          "2951",
          "T002207",
          "T021406",
          "T000126",
          "660564",
          "95918",
          "920206",
          "1727"
        ]
      },
      "release_date": "2021-09-16T22:00:00.000+00:00",
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-20325",
      "notes": [
        {
          "category": "description",
          "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T010951",
          "T015844",
          "T015127",
          "T015126",
          "T004914",
          "T018121",
          "T000756",
          "T020304",
          "T001663",
          "398363",
          "163824",
          "T015519",
          "T015518",
          "T014329",
          "T015516",
          "T011337",
          "7654",
          "T005119",
          "2186",
          "T012167",
          "T016243",
          "T017562",
          "T019403",
          "2951",
          "T002207",
          "T021406",
          "T000126",
          "660564",
          "95918",
          "920206",
          "1727"
        ]
      },
      "release_date": "2021-09-16T22:00:00.000+00:00",
      "title": "CVE-2021-20325"
    },
    {
      "cve": "CVE-2021-36160",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund eines Out-of-Bound Read in \"mod_proxy_uwsgi\". Ein entfernter Angreifer kann diese Schwachstelle ausnutzen, um den zugewiesenen Speicher zu lesen und einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T010951",
          "T015844",
          "T015127",
          "T015126",
          "T004914",
          "T018121",
          "T000756",
          "T020304",
          "T001663",
          "398363",
          "163824",
          "T015519",
          "T015518",
          "T014329",
          "T015516",
          "T011337",
          "7654",
          "T005119",
          "2186",
          "T012167",
          "T016243",
          "T017562",
          "T019403",
          "2951",
          "T002207",
          "T021406",
          "T000126",
          "660564",
          "95918",
          "920206",
          "1727"
        ]
      },
      "release_date": "2021-09-16T22:00:00.000+00:00",
      "title": "CVE-2021-36160"
    }
  ]
}
  CERTFR-2021-AVI-875
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Check Point. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Check Point | N/A | Quantum Security Management versions R81.10, R81, R80.40, R80.30SP, R80.30 3.10, R80.30, R80.20SP, R80.20, R80.10, R80.20.X sans le dernier correctif de sécurité (hotfix) | ||
| Check Point | N/A | Quantum Security Gateways versions R81.10, R81, R80.40, R80.30SP, R80.30 3.10, R80.30, R80.20SP, R80.20, R80.10, R80.20.X sans le dernier correctif de sécurité (hotfix) | ||
| Check Point | N/A | Multi-Domain Management versions R81.10, R81, R80.40, R80.30SP, R80.30 3.10, R80.30, R80.20SP, R80.20, R80.10, R80.20.X sans le dernier correctif de sécurité (hotfix) | ||
| Check Point | N/A | Gaia Embedded for Quantum Spark Appliances sans le dernier correctif de sécurité | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Quantum Security Management versions R81.10, R81, R80.40, R80.30SP, R80.30 3.10, R80.30, R80.20SP, R80.20, R80.10, R80.20.X sans le dernier correctif de s\u00e9curit\u00e9 (hotfix)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Check Point",
          "scada": false
        }
      }
    },
    {
      "description": "Quantum Security Gateways versions R81.10, R81, R80.40, R80.30SP, R80.30 3.10, R80.30, R80.20SP, R80.20, R80.10, R80.20.X sans le dernier correctif de s\u00e9curit\u00e9 (hotfix)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Check Point",
          "scada": false
        }
      }
    },
    {
      "description": "Multi-Domain Management versions R81.10, R81, R80.40, R80.30SP, R80.30 3.10, R80.30, R80.20SP, R80.20, R80.10, R80.20.X sans le dernier correctif de s\u00e9curit\u00e9 (hotfix)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Check Point",
          "scada": false
        }
      }
    },
    {
      "description": "Gaia Embedded for Quantum Spark Appliances sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Check Point",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2021-26690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26690"
    },
    {
      "name": "CVE-2021-33193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33193"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    }
  ],
  "initial_release_date": "2021-11-15T00:00:00",
  "last_revision_date": "2021-11-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-875",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-11-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Check\nPoint. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Check Point",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Check Point sk176113 du 14 novembre 2021",
      "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk176113\u0026src=securityAlerts"
    }
  ]
}
  CERTFR-2022-AVI-291
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Zimbra. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Synacor | Zimbra Collaboration | Zimbra Collaboration Joule versions antérieures à 8.8.15 Patch 31 | ||
| Synacor | Zimbra Collaboration | Zimbra Collaboration Kepler versions antérieures à 9.0.0 Patch 24 | 
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Zimbra Collaboration Joule versions ant\u00e9rieures \u00e0 8.8.15 Patch 31",
      "product": {
        "name": "Zimbra Collaboration",
        "vendor": {
          "name": "Synacor",
          "scada": false
        }
      }
    },
    {
      "description": "Zimbra Collaboration Kepler versions ant\u00e9rieures \u00e0 9.0.0 Patch 24",
      "product": {
        "name": "Zimbra Collaboration",
        "vendor": {
          "name": "Synacor",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-27925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27925"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2022-27924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27924"
    },
    {
      "name": "CVE-2022-27926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27926"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    },
    {
      "name": "CVE-2021-21702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21702"
    }
  ],
  "initial_release_date": "2022-03-31T00:00:00",
  "last_revision_date": "2022-03-31T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-291",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-03-31T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Zimbra. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Zimbra",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Zimbra 8.8.15/P31 du 30 mars 2022",
      "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P31"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Zimbra 9.0.0/P24 du 30 mars 2022",
      "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P24"
    }
  ]
}
  CERTFR-2021-AVI-800
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable.sc. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tenable.sc toutes versions sans le correctif 202110.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2021-33193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33193"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    }
  ],
  "initial_release_date": "2021-10-20T00:00:00",
  "last_revision_date": "2021-10-20T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable TNS-2021-17 du 19 octobre 2021",
      "url": "https://fr.tenable.com/security/tns-2021-17"
    }
  ],
  "reference": "CERTFR-2021-AVI-800",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-10-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable.sc. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans  Tenable.sc",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable TNS-2021-17 du 19 octobre 2021",
      "url": null
    }
  ]
}
  CERTFR-2023-AVI-0051
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2016-8625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
    },
    {
      "name": "CVE-2016-8743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
    },
    {
      "name": "CVE-2017-12613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
    },
    {
      "name": "CVE-2019-1543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
    },
    {
      "name": "CVE-2019-1551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
    },
    {
      "name": "CVE-2020-0549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
    },
    {
      "name": "CVE-2020-0548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-11668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
    },
    {
      "name": "CVE-2020-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
    },
    {
      "name": "CVE-2020-14579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
    },
    {
      "name": "CVE-2020-14573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
    },
    {
      "name": "CVE-2020-14577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
    },
    {
      "name": "CVE-2020-14578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
    },
    {
      "name": "CVE-2020-14621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
    },
    {
      "name": "CVE-2020-14562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
    },
    {
      "name": "CVE-2020-14583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
    },
    {
      "name": "CVE-2020-14581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
    },
    {
      "name": "CVE-2020-14593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
    },
    {
      "name": "CVE-2020-14556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
    },
    {
      "name": "CVE-2020-14145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
    },
    {
      "name": "CVE-2020-14796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
    },
    {
      "name": "CVE-2020-14803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
    },
    {
      "name": "CVE-2020-14792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
    },
    {
      "name": "CVE-2020-14779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
    },
    {
      "name": "CVE-2020-14798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
    },
    {
      "name": "CVE-2020-14797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
    },
    {
      "name": "CVE-2020-14781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
    },
    {
      "name": "CVE-2020-14782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
    },
    {
      "name": "CVE-2020-14871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
    },
    {
      "name": "CVE-2020-8698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
    },
    {
      "name": "CVE-2020-8696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
    },
    {
      "name": "CVE-2020-25704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
    },
    {
      "name": "CVE-2020-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
    },
    {
      "name": "CVE-2020-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
    },
    {
      "name": "CVE-2020-1971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
    },
    {
      "name": "CVE-2020-8695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
    },
    {
      "name": "CVE-2019-20934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
    },
    {
      "name": "CVE-2021-3156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2021-23841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
    },
    {
      "name": "CVE-2021-23840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-12363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2020-12364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
    },
    {
      "name": "CVE-2021-27365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
    },
    {
      "name": "CVE-2021-27363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
    },
    {
      "name": "CVE-2021-27364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
    },
    {
      "name": "CVE-2020-27170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
    },
    {
      "name": "CVE-2021-3450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
    },
    {
      "name": "CVE-2020-35498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
    },
    {
      "name": "CVE-2021-28950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
    },
    {
      "name": "CVE-2021-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
    },
    {
      "name": "CVE-2020-36322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
    },
    {
      "name": "CVE-2021-2194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
    },
    {
      "name": "CVE-2021-2162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
    },
    {
      "name": "CVE-2021-2179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
    },
    {
      "name": "CVE-2021-2307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
    },
    {
      "name": "CVE-2021-2180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
    },
    {
      "name": "CVE-2021-2144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
    },
    {
      "name": "CVE-2021-2226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
    },
    {
      "name": "CVE-2021-2169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
    },
    {
      "name": "CVE-2021-2202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
    },
    {
      "name": "CVE-2021-2166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
    },
    {
      "name": "CVE-2021-2174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
    },
    {
      "name": "CVE-2021-2154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
    },
    {
      "name": "CVE-2020-28196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
    },
    {
      "name": "CVE-2021-2178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
    },
    {
      "name": "CVE-2021-2146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
    },
    {
      "name": "CVE-2021-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
    },
    {
      "name": "CVE-2021-2171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
    },
    {
      "name": "CVE-2021-2161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
    },
    {
      "name": "CVE-2021-2163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
    },
    {
      "name": "CVE-2021-29650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
    },
    {
      "name": "CVE-2021-23017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
    },
    {
      "name": "CVE-2021-25217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
    },
    {
      "name": "CVE-2021-33033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
    },
    {
      "name": "CVE-2020-24512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
    },
    {
      "name": "CVE-2020-24513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
    },
    {
      "name": "CVE-2020-24511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    },
    {
      "name": "CVE-2021-33034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
    },
    {
      "name": "CVE-2021-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
    },
    {
      "name": "CVE-2021-3573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
    },
    {
      "name": "CVE-2020-36385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
    },
    {
      "name": "CVE-2020-27827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-33909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
    },
    {
      "name": "CVE-2021-2388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
    },
    {
      "name": "CVE-2021-2341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
    },
    {
      "name": "CVE-2021-2432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
    },
    {
      "name": "CVE-2021-2369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    },
    {
      "name": "CVE-2021-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
    },
    {
      "name": "CVE-2021-27219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
    },
    {
      "name": "CVE-2020-26137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2020-26116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
    },
    {
      "name": "CVE-2021-35603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
    },
    {
      "name": "CVE-2021-35586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
    },
    {
      "name": "CVE-2021-35559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
    },
    {
      "name": "CVE-2021-35567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
    },
    {
      "name": "CVE-2021-35578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
    },
    {
      "name": "CVE-2021-35550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
    },
    {
      "name": "CVE-2021-35561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
    },
    {
      "name": "CVE-2021-35565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
    },
    {
      "name": "CVE-2021-35564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
    },
    {
      "name": "CVE-2021-35556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
    },
    {
      "name": "CVE-2021-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
    },
    {
      "name": "CVE-2021-0920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
    },
    {
      "name": "CVE-2021-42739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
    },
    {
      "name": "CVE-2021-44790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
    },
    {
      "name": "CVE-2021-4083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
    },
    {
      "name": "CVE-2021-4155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
    },
    {
      "name": "CVE-2022-21349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
    },
    {
      "name": "CVE-2022-21277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
    },
    {
      "name": "CVE-2022-21291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
    },
    {
      "name": "CVE-2022-21340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
    },
    {
      "name": "CVE-2022-21282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
    },
    {
      "name": "CVE-2022-21341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
    },
    {
      "name": "CVE-2022-21365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
    },
    {
      "name": "CVE-2022-21305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
    },
    {
      "name": "CVE-2022-21366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
    },
    {
      "name": "CVE-2022-21360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
    },
    {
      "name": "CVE-2022-21296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
    },
    {
      "name": "CVE-2022-21293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
    },
    {
      "name": "CVE-2022-21248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
    },
    {
      "name": "CVE-2022-21299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
    },
    {
      "name": "CVE-2022-21294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
    },
    {
      "name": "CVE-2022-21283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2021-4028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
    },
    {
      "name": "CVE-2022-2526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
    },
    {
      "name": "CVE-2022-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
    },
    {
      "name": "CVE-2022-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
    },
    {
      "name": "CVE-2022-21449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
    },
    {
      "name": "CVE-2022-21476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
    },
    {
      "name": "CVE-2022-21125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
    },
    {
      "name": "CVE-2022-21123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
    },
    {
      "name": "CVE-2022-21166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
    },
    {
      "name": "CVE-2022-38178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2022-32250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2021-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2022-0330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2022-0492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2022-22720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2022-21434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
    },
    {
      "name": "CVE-2022-21443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
    },
    {
      "name": "CVE-2022-21496",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
    },
    {
      "name": "CVE-2022-21426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2022-1729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
    },
    {
      "name": "CVE-2021-30465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
    },
    {
      "name": "CVE-2021-42574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
    },
    {
      "name": "CVE-2022-21541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
    },
    {
      "name": "CVE-2022-34169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
    },
    {
      "name": "CVE-2022-21549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
    },
    {
      "name": "CVE-2022-21540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
    },
    {
      "name": "CVE-2007-6755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2021-3765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
    },
    {
      "name": "CVE-2022-24903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
    },
    {
      "name": "CVE-2022-21626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
    },
    {
      "name": "CVE-2022-21619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
    },
    {
      "name": "CVE-2022-21628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
    },
    {
      "name": "CVE-2022-21624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
    },
    {
      "name": "CVE-2019-11287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
    },
    {
      "name": "CVE-2023-22397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
    },
    {
      "name": "CVE-2023-22403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
    },
    {
      "name": "CVE-2023-22398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
    },
    {
      "name": "CVE-2023-22399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
    },
    {
      "name": "CVE-2023-22417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
    },
    {
      "name": "CVE-2023-22395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
    },
    {
      "name": "CVE-2023-22391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
    },
    {
      "name": "CVE-2023-22409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
    },
    {
      "name": "CVE-2023-22407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
    },
    {
      "name": "CVE-2023-22414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
    },
    {
      "name": "CVE-2023-22393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
    },
    {
      "name": "CVE-2023-22415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
    },
    {
      "name": "CVE-2023-22405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
    },
    {
      "name": "CVE-2023-22412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
    },
    {
      "name": "CVE-2020-24489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
    },
    {
      "name": "CVE-2023-22404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
    },
    {
      "name": "CVE-2021-3504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
    },
    {
      "name": "CVE-2023-22394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
    },
    {
      "name": "CVE-2023-22406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
    },
    {
      "name": "CVE-2018-8046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
    },
    {
      "name": "CVE-2007-2285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
    },
    {
      "name": "CVE-2021-35940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
    },
    {
      "name": "CVE-2023-22411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
    },
    {
      "name": "CVE-2023-22401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
    },
    {
      "name": "CVE-2020-15778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
    },
    {
      "name": "CVE-2023-22396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
    },
    {
      "name": "CVE-2023-22402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
    },
    {
      "name": "CVE-2021-3621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
    },
    {
      "name": "CVE-2023-22400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
    },
    {
      "name": "CVE-2023-22408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
    },
    {
      "name": "CVE-2022-0934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
    },
    {
      "name": "CVE-2021-40085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
    },
    {
      "name": "CVE-2023-22410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
    },
    {
      "name": "CVE-2023-22416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
    },
    {
      "name": "CVE-2023-22413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
    }
  ],
  "initial_release_date": "2023-01-23T00:00:00",
  "last_revision_date": "2023-01-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0051",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-01-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
    }
  ]
}
  CERTFR-2022-AVI-368
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Virtualization. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Virtualization | Oracle Secure Global Desktop version 5.6 | ||
| Oracle | Virtualization | Oracle VM VirtualBox versions antérieures à 6.1.34 | 
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle Secure Global Desktop version 5.6",
      "product": {
        "name": "Virtualization",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle VM VirtualBox versions ant\u00e9rieures \u00e0 6.1.34",
      "product": {
        "name": "Virtualization",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-21487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21487"
    },
    {
      "name": "CVE-2022-21471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21471"
    },
    {
      "name": "CVE-2022-21491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21491"
    },
    {
      "name": "CVE-2022-21465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21465"
    },
    {
      "name": "CVE-2022-21488",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21488"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    }
  ],
  "initial_release_date": "2022-04-20T00:00:00",
  "last_revision_date": "2022-04-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-368",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-04-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle\nVirtualization. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Virtualization",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle verbose cpuapr2022 du 19 avril 2022",
      "url": "https://www.oracle.com/security-alerts/cpuapr2022verbose.html#OVIR"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2022 du 19 avril 2022",
      "url": "https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixOVIR"
    }
  ]
}
  CERTFR-2024-AVI-0575
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.1-EVO antérieures à 22.1R3-S6-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.4 antérieures à 22.4R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 23.2 antérieures à 23.2R2-S1 | ||
| Juniper Networks | N/A | Session Smart Router versions 6.2 antérieures à SSR-6.2.5-r2 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.4-EVO antérieures à 22.4R3-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.2-EVO antérieures à 23.2R2-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 antérieures à 21.4R3-S7 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 21.2 antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS versions 22.1 antérieures à 22.1R3-S6 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 antérieures à 22.3R3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.3-EVO antérieures à 21.3R3-S5-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.2-EVO antérieures à 21.2R3-S7-EVO | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 20.4R3-S9 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.4-EVO antérieures à 23.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R2-S2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.2 antérieures à 22.2R3-S4 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Session Smart Router versions 6.1 antérieures à SSR-6.1.8-lts | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 antérieures à 20.4R3-S10 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 antérieures à 22.2R3-S1 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 antérieures à 21.3R3-S5 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 21.4 antérieures à 21.4R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R1-S2 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 antérieures à 22.2R3-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 23.2R1-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.1 antérieures à 22.1R3-S6 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 antérieures à 21.2R3-S6 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions antérieures à 21.2R3-S6 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R1-S1-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 21.4R3-S8 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 22.4R3-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.4 antérieures à 23.4R1-S1 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions antérieures à 21.2R3-S7 | ||
| Juniper Networks | N/A | Session Smart Router versions antérieures à SSR-5.6.14 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.2R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 antérieures à 22.1R3-S2 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 antérieures à 22.3R3-S1 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions antérieures à 21.4R3-S7-EVO | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.3-EVO antérieures à 22.3R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R1-S2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.3 antérieures à 22.3R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R1-S1-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos Space versions antérieures à 24.1R1 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 20.4R3-S10-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.4 antérieures à 22.4R3-S1 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R1-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R2-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions antérieures à 21.2R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S1-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à before 22.1R3-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 antérieures à 22.3R2-S1 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.2-EVO antérieures à 22.2R3-S4-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 antérieures à 22.1R3-S4 | ||
| Juniper Networks | N/A | Junos OS versions 21.3 antérieures à 21.3R3-S5 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 22.1R2-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.1-EVO antérieures à 22.1R3-S6-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R3-S4 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 21.4 antérieures à 21.4R3-S7 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.4-EVO antérieures à 23.4R1-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 22.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R2-S1 | ||
| Juniper Networks | N/A | Junos OS versions 23.1 antérieures à 23.1R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R3-S4-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R2-S2 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R2-S1-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R1-S2-EVO | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions 6.2 ant\u00e9rieures \u00e0 SSR-6.2.5-r2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.3-EVO ant\u00e9rieures \u00e0 21.3R3-S5-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.2-EVO ant\u00e9rieures \u00e0 21.2R3-S7-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 20.4R3-S9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R2-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions 6.1 ant\u00e9rieures \u00e0 SSR-6.1.8-lts",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 ant\u00e9rieures \u00e0 20.4R3-S10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 21.4 ant\u00e9rieures \u00e0 21.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 23.2R1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.2R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R1-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 21.4R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions ant\u00e9rieures \u00e0 21.2R3-S7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-5.6.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R1-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R1-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S10-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R1-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R2-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 before 22.1R3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 22.1R2-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R2-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.1 ant\u00e9rieures \u00e0 23.1R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R2-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-39560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39560"
    },
    {
      "name": "CVE-2023-32435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32435"
    },
    {
      "name": "CVE-2021-44906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
    },
    {
      "name": "CVE-2024-20919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
    },
    {
      "name": "CVE-2024-39554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39554"
    },
    {
      "name": "CVE-2023-21843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
    },
    {
      "name": "CVE-2024-39539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39539"
    },
    {
      "name": "CVE-2021-36160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36160"
    },
    {
      "name": "CVE-2020-12401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
    },
    {
      "name": "CVE-2024-39558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39558"
    },
    {
      "name": "CVE-2022-30522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30522"
    },
    {
      "name": "CVE-2021-37701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
    },
    {
      "name": "CVE-2022-21460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
    },
    {
      "name": "CVE-2021-31535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
    },
    {
      "name": "CVE-2022-36760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36760"
    },
    {
      "name": "CVE-2021-33034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
    },
    {
      "name": "CVE-2024-20926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
    },
    {
      "name": "CVE-2024-39552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39552"
    },
    {
      "name": "CVE-2021-27290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
    },
    {
      "name": "CVE-2019-11727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
    },
    {
      "name": "CVE-2023-3390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
    },
    {
      "name": "CVE-2023-4004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
    },
    {
      "name": "CVE-2021-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29469"
    },
    {
      "name": "CVE-2023-2002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2002"
    },
    {
      "name": "CVE-2023-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2021-23440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23440"
    },
    {
      "name": "CVE-2021-32804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
    },
    {
      "name": "CVE-2020-13950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13950"
    },
    {
      "name": "CVE-2021-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
    },
    {
      "name": "CVE-2024-39546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39546"
    },
    {
      "name": "CVE-2024-39540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39540"
    },
    {
      "name": "CVE-2018-3737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3737"
    },
    {
      "name": "CVE-2024-39543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39543"
    },
    {
      "name": "CVE-2020-11984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11984"
    },
    {
      "name": "CVE-2022-22721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22721"
    },
    {
      "name": "CVE-2021-35624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
    },
    {
      "name": "CVE-2023-35788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
    },
    {
      "name": "CVE-2023-32067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
    },
    {
      "name": "CVE-2024-39514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39514"
    },
    {
      "name": "CVE-2022-25147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
    },
    {
      "name": "CVE-2021-35604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
    },
    {
      "name": "CVE-2021-42013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42013"
    },
    {
      "name": "CVE-2023-34059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34059"
    },
    {
      "name": "CVE-2024-39529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39529"
    },
    {
      "name": "CVE-2006-20001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-20001"
    },
    {
      "name": "CVE-2024-20921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2022-29167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29167"
    },
    {
      "name": "CVE-2020-7774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
    },
    {
      "name": "CVE-2019-10747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10747"
    },
    {
      "name": "CVE-2023-34058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34058"
    },
    {
      "name": "CVE-2011-5094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-5094"
    },
    {
      "name": "CVE-2019-16776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
    },
    {
      "name": "CVE-2022-21589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2019-10097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10097"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2023-2828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
    },
    {
      "name": "CVE-2023-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
    },
    {
      "name": "CVE-2023-4206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
    },
    {
      "name": "CVE-2022-21304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
    },
    {
      "name": "CVE-2023-3090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
    },
    {
      "name": "CVE-2024-39536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39536"
    },
    {
      "name": "CVE-2024-39555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39555"
    },
    {
      "name": "CVE-2022-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
    },
    {
      "name": "CVE-2023-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
    },
    {
      "name": "CVE-2020-13938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13938"
    },
    {
      "name": "CVE-2016-10540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-10540"
    },
    {
      "name": "CVE-2019-10082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10082"
    },
    {
      "name": "CVE-2023-42753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
    },
    {
      "name": "CVE-2016-1000232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000232"
    },
    {
      "name": "CVE-2015-9262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
    },
    {
      "name": "CVE-2023-32360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
    },
    {
      "name": "CVE-2021-37713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2024-39561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39561"
    },
    {
      "name": "CVE-2022-21303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
    },
    {
      "name": "CVE-2019-17023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
    },
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2020-35452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35452"
    },
    {
      "name": "CVE-2023-4207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
    },
    {
      "name": "CVE-2022-21617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
    },
    {
      "name": "CVE-2023-0767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
    },
    {
      "name": "CVE-2022-41741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41741"
    },
    {
      "name": "CVE-2023-22067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
    },
    {
      "name": "CVE-2021-37712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2023-30630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
    },
    {
      "name": "CVE-2022-21608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
    },
    {
      "name": "CVE-2022-2526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
    },
    {
      "name": "CVE-2023-20593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
    },
    {
      "name": "CVE-2024-39535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39535"
    },
    {
      "name": "CVE-2024-39545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39545"
    },
    {
      "name": "CVE-2024-39531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39531"
    },
    {
      "name": "CVE-2022-41742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41742"
    },
    {
      "name": "CVE-2019-16777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2023-21840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
    },
    {
      "name": "CVE-2019-10081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10081"
    },
    {
      "name": "CVE-2020-1934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1934"
    },
    {
      "name": "CVE-2022-30556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30556"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2022-21270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
    },
    {
      "name": "CVE-2023-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2023-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21980"
    },
    {
      "name": "CVE-2024-39530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39530"
    },
    {
      "name": "CVE-2024-39532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39532"
    },
    {
      "name": "CVE-2023-27522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27522"
    },
    {
      "name": "CVE-2024-39557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39557"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2024-39550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39550"
    },
    {
      "name": "CVE-2022-28615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28615"
    },
    {
      "name": "CVE-2022-21451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
    },
    {
      "name": "CVE-2014-10064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-10064"
    },
    {
      "name": "CVE-2024-39511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39511"
    },
    {
      "name": "CVE-2022-23943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23943"
    },
    {
      "name": "CVE-2024-39548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39548"
    },
    {
      "name": "CVE-2020-11993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11993"
    },
    {
      "name": "CVE-2023-22652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22652"
    },
    {
      "name": "CVE-2024-39528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39528"
    },
    {
      "name": "CVE-2023-3341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
    },
    {
      "name": "CVE-2023-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
    },
    {
      "name": "CVE-2021-43527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
    },
    {
      "name": "CVE-2022-37434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
    },
    {
      "name": "CVE-2024-39559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39559"
    },
    {
      "name": "CVE-2014-7191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7191"
    },
    {
      "name": "CVE-2021-2356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
    },
    {
      "name": "CVE-2020-36049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36049"
    },
    {
      "name": "CVE-2023-4208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
    },
    {
      "name": "CVE-2021-41524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41524"
    },
    {
      "name": "CVE-2022-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
    },
    {
      "name": "CVE-2020-12402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
    },
    {
      "name": "CVE-2019-11719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2024-39519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39519"
    },
    {
      "name": "CVE-2021-32803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
    },
    {
      "name": "CVE-2019-17006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
    },
    {
      "name": "CVE-2022-21595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
    },
    {
      "name": "CVE-2019-16775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
    },
    {
      "name": "CVE-2020-12403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
    },
    {
      "name": "CVE-2023-3776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
    },
    {
      "name": "CVE-2023-2700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2700"
    },
    {
      "name": "CVE-2020-7754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7754"
    },
    {
      "name": "CVE-2024-39533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39533"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-33909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
    },
    {
      "name": "CVE-2021-26690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26690"
    },
    {
      "name": "CVE-2022-22719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22719"
    },
    {
      "name": "CVE-2022-40674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
    },
    {
      "name": "CVE-2022-46663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46663"
    },
    {
      "name": "CVE-2011-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1473"
    },
    {
      "name": "CVE-2024-39513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39513"
    },
    {
      "name": "CVE-2021-3803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
    },
    {
      "name": "CVE-2022-21417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
    },
    {
      "name": "CVE-2024-39518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39518"
    },
    {
      "name": "CVE-2023-37450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37450"
    },
    {
      "name": "CVE-2021-30641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30641"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-7660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7660"
    },
    {
      "name": "CVE-2022-31813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31813"
    },
    {
      "name": "CVE-2023-34969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
    },
    {
      "name": "CVE-2019-9517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517"
    },
    {
      "name": "CVE-2018-20834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20834"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2020-1927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1927"
    },
    {
      "name": "CVE-2022-21592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2023-25690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2022-22720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
    },
    {
      "name": "CVE-2017-15010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
    },
    {
      "name": "CVE-2019-10092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10092"
    },
    {
      "name": "CVE-2024-39541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39541"
    },
    {
      "name": "CVE-2021-44224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44224"
    },
    {
      "name": "CVE-2024-39537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39537"
    },
    {
      "name": "CVE-2022-21444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
    },
    {
      "name": "CVE-2019-17567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17567"
    },
    {
      "name": "CVE-2018-7408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-7408"
    },
    {
      "name": "CVE-2019-20149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20149"
    },
    {
      "name": "CVE-2024-20932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
    },
    {
      "name": "CVE-2023-35001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
    },
    {
      "name": "CVE-2024-39551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39551"
    },
    {
      "name": "CVE-2023-4863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
    },
    {
      "name": "CVE-2022-29404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29404"
    },
    {
      "name": "CVE-2020-14145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
    },
    {
      "name": "CVE-2019-11756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
    },
    {
      "name": "CVE-2024-20918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
    },
    {
      "name": "CVE-2024-39565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39565"
    },
    {
      "name": "CVE-2021-31618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31618"
    },
    {
      "name": "CVE-2022-21344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
    },
    {
      "name": "CVE-2023-24329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
    },
    {
      "name": "CVE-2024-39549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39549"
    },
    {
      "name": "CVE-2022-21367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
    },
    {
      "name": "CVE-2021-33193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33193"
    },
    {
      "name": "CVE-2021-41773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41773"
    },
    {
      "name": "CVE-2020-11668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
    },
    {
      "name": "CVE-2022-26377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26377"
    },
    {
      "name": "CVE-2021-44790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
    },
    {
      "name": "CVE-2020-9490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9490"
    },
    {
      "name": "CVE-2020-28502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28502"
    },
    {
      "name": "CVE-2024-39556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39556"
    },
    {
      "name": "CVE-2022-37436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37436"
    },
    {
      "name": "CVE-2021-33033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
    },
    {
      "name": "CVE-2023-32439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32439"
    },
    {
      "name": "CVE-2020-12400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
    },
    {
      "name": "CVE-2023-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
    },
    {
      "name": "CVE-2022-28330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28330"
    },
    {
      "name": "CVE-2024-39542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39542"
    },
    {
      "name": "CVE-2022-21454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
    },
    {
      "name": "CVE-2017-1000048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000048"
    },
    {
      "name": "CVE-2022-21427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    },
    {
      "name": "CVE-2024-20945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2020-6829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2022-21245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2024-20952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
    },
    {
      "name": "CVE-2019-10098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10098"
    },
    {
      "name": "CVE-2024-39538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39538"
    },
    {
      "name": "CVE-2022-28614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28614"
    }
  ],
  "initial_release_date": "2024-07-12T00:00:00",
  "last_revision_date": "2024-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0575",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-12T00:00:00.000000"
    },
    {
      "description": "Correction d\u0027identifiants CVE erron\u00e9s",
      "revision_date": "2024-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
  "vendor_advisories": [
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83001",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Inconsistent-information-in-the-TE-database-can-lead-to-an-rpd-crash-CVE-2024-39541"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82976",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-The-802-1X-Authentication-Daemon-crashes-on-running-a-specific-command-CVE-2024-39511"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83027",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83021",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX4600-SRX5000-Series-TCP-packets-with-SYN-FIN-or-SYN-RST-are-transferred-after-enabling-no-syn-check-with-Express-Path-CVE-2024-39561"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83018",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-specific-PIM-packet-causes-rpd-crash-when-PIM-is-configured-along-with-MoFRR-CVE-2024-39558"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82987",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crashes-upon-concurrent-deletion-of-a-routing-instance-and-receipt-of-an-SNMP-request-CVE-2024-39528"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82982",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX240-MX480-MX960-platforms-using-MPC10E-Memory-leak-will-be-observed-when-subscribed-to-a-specific-subscription-on-Junos-Telemetry-Interface-CVE-2024-39518"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83012",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-line-card-Port-flaps-causes-rtlogd-memory-leak-leading-to-Denial-of-Service-CVE-2024-39550"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83019",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-a-specific-TCP-packet-may-result-in-a-system-crash-vmcore-on-dual-RE-systems-with-NSR-enabled-CVE-2024-39559"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83004",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-large-RPKI-RTR-PDU-packet-can-cause-rpd-to-crash-CVE-2024-39543"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83010",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-specific-packets-in-the-aftmand-process-will-lead-to-a-memory-leak-CVE-2024-39548"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83014",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-BGP-multipath-incremental-calculation-is-resulting-in-an-rpd-crash-CVE-2024-39554"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82996",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Flaps-of-BFD-sessions-with-authentication-cause-a-ppmd-memory-leak-CVE-2024-39536"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82980",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receiving-specific-traffic-on-devices-with-EVPN-VPWS-with-IGMP-snooping-enabled-will-cause-the-rpd-to-crash-CVE-2024-39514"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83000",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-Specific-valid-TCP-traffic-can-cause-a-pfe-crash-CVE-2024-39540"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83008",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Local-low-privilege-user-can-gain-root-permissions-leading-to-privilege-escalation-CVE-2024-39546"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82991",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Protocol-specific-DDoS-configuration-affects-other-protocols-CVE-2024-39531"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83011",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Receipt-of-malformed-BGP-path-attributes-leads-to-a-memory-leak-CVE-2024-39549"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82989",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Attempting-to-access-specific-sensors-on-platforms-not-supporting-these-will-lead-to-a-chassisd-crash-CVE-2024-39530"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82997",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Ports-which-have-been-inadvertently-exposed-can-be-reached-over-the-network-CVE-2024-39537"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83023",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-EX-Series-J-Web-An-unauthenticated-network-based-attacker-can-perform-XPATH-injection-attack-against-a-device-CVE-2024-39565"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83026",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R1-release"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83013",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-MS-MPC-MIC-Receipt-of-specific-packets-in-H-323-ALG-causes-traffic-drop-CVE-2024-39551"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83002",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-CFM-packet-or-specific-transit-traffic-leads-to-FPC-crash-CVE-2024-39542"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83015",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-malformed-BGP-update-causes-the-session-to-reset-CVE-2024-39555"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83007",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-NFX350-When-VPN-tunnels-parameters-are-not-matching-the-iked-process-will-crash-CVE-2024-39545"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82995",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-specific-traffic-is-received-in-a-VPLS-scenario-evo-pfemand-crashes-CVE-2024-39535"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82993",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX4600-Series-Output-firewall-filter-is-not-applied-if-certain-match-criteria-are-used-CVE-2024-39533"
    },
    {
      "published_at": "2024-07-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75726",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Malformed-BGP-UPDATE-causes-RPD-crash-CVE-2024-39552"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82988",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-If-DNS-traceoptions-are-configured-in-a-DGA-or-tunnel-detection-scenario-specific-DNS-traffic-leads-to-a-PFE-crash-CVE-2024-39529"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83017",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-MAC-table-changes-cause-a-memory-leak-CVE-2024-39557"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82983",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX-7000-Series-Multicast-traffic-is-looped-in-a-multihoming-EVPN-MPLS-scenario-CVE-2024-39519"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83020",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Memory-leak-due-to-RSVP-neighbor-persistent-error-leading-to-kernel-crash-CVE-2024-39560"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82998",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-multicast-traffic-with-a-specific-S-G-is-received-evo-pfemand-crashes-CVE-2024-39538"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82999",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-Continuous-subscriber-logins-will-lead-to-a-memory-leak-and-eventually-an-FPC-crash-CVE-2024-39539"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83016",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Loading-a-malicious-certificate-from-the-CLI-may-result-in-a-stack-based-overflow-CVE-2024-39556"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82992",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Confidential-information-in-logs-can-be-accessed-by-another-user-CVE-2024-39532"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82978",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Execution-of-a-specific-CLI-command-will-cause-a-crash-in-the-AFT-manager-CVE-2024-39513"
    }
  ]
}
  CERTFR-2022-AVI-547
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SICAM GridEdge Essential with GDS ARM (6MD7881-2AA10) versions antérieures à V2.6.6 | ||
| Siemens | N/A | SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) toutes versions | ||
| Siemens | N/A | TALON TC Compact (BACnet) versions antérieures à V3.5 | ||
| Siemens | N/A | SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) toutes versions | ||
| Siemens | N/A | SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions | ||
| Siemens | N/A | SIMATIC RF650R (6GT2811-6AB20) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SIMATIC RF610R (6GT2811-6BC10) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | EN100 Ethernet module IEC 104 variant toutes versions | ||
| Siemens | N/A | SICAM GridEdge Essential ARM (6MD7881-2AA30) versions antérieures à V2.6.6 | ||
| Siemens | N/A | SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) toutes versions | ||
| Siemens | N/A | Teamcenter V12.4 versions antérieures à V12.4.0.13 | ||
| Siemens | N/A | SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions | ||
| Siemens | N/A | APOGEE PXC Modular (BACnet) versions antérieures à V3.5 | ||
| Siemens | N/A | SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) toutes versions | ||
| Siemens | N/A | EN100 Ethernet module IEC 61850 variant versions antérieures à V4.37 | ||
| Siemens | N/A | Xpedition Designer versions antérieures à X.2.11 | ||
| Siemens | N/A | SIMATIC NET PC Software V15 toutes versions | ||
| Siemens | N/A | SIMATIC RF186C (6GT2002-0JE20) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1543-1 (incl. SIPLUS variants) versions antérieures à V3.0 | ||
| Siemens | N/A | SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) toutes versions | ||
| Siemens | N/A | SIMATIC WinCC (TIA Portal) toutes versions | ||
| Siemens | N/A | EN100 Ethernet module Modbus TCP variant toutes versions | ||
| Siemens | N/A | SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions | ||
| Siemens | N/A | SIMATIC RF188C (6GT2002-0JE40) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SINAUT Software ST7sc toutes versions | ||
| Siemens | N/A | SIMATIC STEP 7 V5.X toutes versions | ||
| Siemens | N/A | SIMATIC RF166C (6GT2002-0EE20) versions antérieures à V2.0.1 | ||
| Siemens | N/A | Teamcenter V13.0 versions antérieures à V13.0.0.9 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) toutes versions | ||
| Siemens | N/A | SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1626 (6GK1162-6AA01) toutes versions | ||
| Siemens | N/A | TIA Portal V15 toutes versions | ||
| Siemens | N/A | SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) toutes versions | ||
| Siemens | N/A | SIMATIC NET PC Software V14 toutes versions | ||
| Siemens | N/A | APOGEE PXC Compact (P2 Ethernet) toutes versions | ||
| Siemens | N/A | RUGGEDCOM CROSSBOW Station Access Controller toutes versions | ||
| Siemens | N/A | SCALANCE XR528-6M (6GK5528-0AA00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC RF188CI (6GT2002-0JE60) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) toutes versions | ||
| Siemens | N/A | SICAM GridEdge Essential Intel (6MD7881-2AA40) versions antérieures à V2.6.6 | ||
| Siemens | N/A | TIA Portal V16 toutes versions | ||
| Siemens | N/A | SIMATIC PDM toutes versions | ||
| Siemens | N/A | Spectrum Power 4 toutes versions using Shared HIS | ||
| Siemens | N/A | SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) toutes versions | ||
| Siemens | N/A | SCALANCE XR552-12M (6GK5552-0AA00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC NET PC Software V16 toutes versions | ||
| Siemens | N/A | SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC MV540 H (6GF3540-0GE10) toutes versions | ||
| Siemens | N/A | SIMATIC RF360R (6GT2801-5BA30) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions | ||
| Siemens | N/A | SIMATIC STEP 7 (TIA Portal) toutes versions | ||
| Siemens | N/A | SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XM408-4C (6GK5408-4GP00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SINUMERIK Edge versions antérieures à V3.3.0 | ||
| Siemens | N/A | SCALANCE LPE9403 (6GK5998-3GS00-2AC2) versions antérieures à V2.0 | ||
| Siemens | N/A | Spectrum Power MGMS toutes versions using Shared HIS | ||
| Siemens | N/A | SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions | ||
| Siemens | N/A | Teamcenter V13.2 toutes versions | ||
| Siemens | N/A | SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) versions antérieures à V1.1 | ||
| Siemens | N/A | SCALANCE S615 (6GK5615-0AA00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions | ||
| Siemens | N/A | RUGGEDCOM ROX Series toutes versions | ||
| Siemens | N/A | SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC RF185C (6GT2002-0JE10) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE MUM853-1 (RoW) (6GK5853-2EA00-2AA1) toutes versions | ||
| Siemens | N/A | EN100 Ethernet module PROFINET IO variant toutes versions | ||
| Siemens | N/A | SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | TIA Portal Cloud toutes versions | ||
| Siemens | N/A | SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-PLCSIM Advanced toutes versions | ||
| Siemens | N/A | SINEMA Remote Connect Server versions antérieures à V3.1 | ||
| Siemens | N/A | SIMATIC Logon toutes versions | ||
| Siemens | N/A | SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions | ||
| Siemens | N/A | SIMATIC MV550 S (6GF3550-0CD10) toutes versions | ||
| Siemens | N/A | SIMATIC MV550 H (6GF3550-0GE10) toutes versions | ||
| Siemens | N/A | TIM 1531 IRC (6GK7543-1MX00-0XE0) toutes versions | ||
| Siemens | N/A | SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0) toutes versions | ||
| Siemens | N/A | Mendix SAML Module (Mendix 8 compatible) versions antérieures à 2.2.2 | ||
| Siemens | N/A | APOGEE PXC Modular (P2 Ethernet) toutes versions | ||
| Siemens | N/A | Teamcenter V13.3 versions antérieures à V13.3.0.3 | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) versions antérieures à V6.5 | ||
| Siemens | N/A | Teamcenter Active Workspace V6.0 versions antérieures à V6.0.3 | ||
| Siemens | N/A | SIMATIC S7-1200 CPU family (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions | ||
| Siemens | N/A | SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions versions antérieures à V2.3.1 | ||
| Siemens | N/A | Mendix SAML Module (Mendix 7 compatible) versions antérieures à 1.16.6 | ||
| Siemens | N/A | EN100 Ethernet module DNP3 IP variant toutes versions | ||
| Siemens | N/A | SCALANCE XM416-4C (6GK5416-4GS00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) toutes versions | ||
| Siemens | N/A | Industrial Edge - PROFINET IO Connector toutes versions | ||
| Siemens | N/A | SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) toutes versions | ||
| Siemens | N/A | RUGGEDCOM ROS Series toutes versions | ||
| Siemens | N/A | TIA Portal V17 toutes versions | ||
| Siemens | N/A | TALON TC Modular (BACnet) versions antérieures à V3.5 | ||
| Siemens | N/A | SIMATIC PCS 7 TeleControl toutes versions | ||
| Siemens | N/A | APOGEE PXC Compact (BACnet) versions antérieures à V3.5 | ||
| Siemens | N/A | SCALANCE MUM856-1 (NAM) (6GK5856-2EA00-3BA1) toutes versions | ||
| Siemens | N/A | SIMATIC RF685R (6GT2811-6CA10) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SINEMA Server V14 toutes versions | ||
| Siemens | N/A | SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions versions antérieures à V2.3.1 | ||
| Siemens | N/A | SIMATIC RF680R (6GT2811-6AA10) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SIMATIC MV560 U (6GF3560-0LE10) toutes versions | ||
| Siemens | N/A | Industrial Edge - SIMATIC S7 Connector App versions antérieures à V1.7.0 | ||
| Siemens | N/A | SINEC INS toutes versions | ||
| Siemens | N/A | SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) toutes versions | ||
| Siemens | N/A | SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions versions antérieures à V2.3.1 | ||
| Siemens | N/A | TIA Administrator toutes versions | ||
| Siemens | N/A | SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | TeleControl Server Basic V3 toutes versions | ||
| Siemens | N/A | SINAUT ST7CC toutes versions | ||
| Siemens | N/A | SCALANCE XM408-8C (6GK5408-8GS00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC NET PC Software V17 toutes versions | ||
| Siemens | N/A | Spectrum Power 7 toutes versions using Shared HIS | ||
| Siemens | N/A | SIMATIC MV560 X (6GF3560-0HE10) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller (incl. F) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) toutes versions | ||
| Siemens | N/A | SINEMA Remote Connect Server versions antérieures à 3.0 SP2 | ||
| Siemens | N/A | Industrial Edge - OPC UA Connector toutes versions | ||
| Siemens | N/A | Teamcenter Active Workspace V5.2 versions antérieures à V5.2.9 | ||
| Siemens | N/A | SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions versions antérieures à V2.3.1 | ||
| Siemens | N/A | SINEC NMS toutes versions | ||
| Siemens | N/A | Mendix SAML Module (Mendix 9 compatible) versions antérieures à 3.2.3 | ||
| Siemens | N/A | Teamcenter V14.0 toutes versions | ||
| Siemens | N/A | SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) toutes versions | ||
| Siemens | N/A | SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) toutes versions | ||
| Siemens | N/A | SIMATIC RF615R (6GT2811-6CC10) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00) toutes versions | ||
| Siemens | N/A | SIMATIC RF186CI (6GT2002-0JE50) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC CP 1628 (6GK1162-8AA00) toutes versions | ||
| Siemens | N/A | SICAM GridEdge Essential with GDS Intel (6MD7881-2AA20) versions antérieures à V2.6.6 | ||
| Siemens | N/A | Teamcenter V13.1 versions antérieures à V13.1.0.9 | ||
| Siemens | N/A | SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions versions antérieures à V2.3.1 | ||
| Siemens | N/A | SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC MV540 S (6GF3540-0CD10) toutes versions | ||
| Siemens | N/A | SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0) toutes versions | ||
| Siemens | N/A | SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions | ||
| Siemens | N/A | SIMATIC PCS neo toutes versions | ||
| Siemens | N/A | RUGGEDCOM NMS toutes versions | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM GridEdge Essential with GDS ARM (6MD7881-2AA10) versions ant\u00e9rieures \u00e0 V2.6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TALON TC Compact (BACnet) versions ant\u00e9rieures \u00e0 V3.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF650R (6GT2811-6AB20) versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF610R (6GT2811-6BC10) versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "EN100 Ethernet module IEC 104 variant toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM GridEdge Essential ARM (6MD7881-2AA30) versions ant\u00e9rieures \u00e0 V2.6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V12.4 versions ant\u00e9rieures \u00e0 V12.4.0.13",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "APOGEE PXC Modular (BACnet) versions ant\u00e9rieures \u00e0 V3.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "EN100 Ethernet module IEC 61850 variant versions ant\u00e9rieures \u00e0 V4.37",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Xpedition Designer versions ant\u00e9rieures \u00e0 X.2.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC NET PC Software V15 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF186C (6GT2002-0JE20) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1543-1 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC (TIA Portal) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "EN100 Ethernet module Modbus TCP variant toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF188C (6GT2002-0JE40) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINAUT Software ST7sc toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V5.X toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF166C (6GT2002-0EE20) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V13.0 versions ant\u00e9rieures \u00e0 V13.0.0.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1626 (6GK1162-6AA01) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal V15 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC NET PC Software V14 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "APOGEE PXC Compact (P2 Ethernet) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM CROSSBOW Station Access Controller toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF188CI (6GT2002-0JE60) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM GridEdge Essential Intel (6MD7881-2AA40) versions ant\u00e9rieures \u00e0 V2.6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal V16 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PDM toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Spectrum Power 4 toutes versions using Shared HIS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC NET PC Software V16 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV540 H (6GF3540-0GE10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF360R (6GT2801-5BA30) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 (TIA Portal) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINUMERIK Edge versions ant\u00e9rieures \u00e0 V3.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2) versions ant\u00e9rieures \u00e0 V2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Spectrum Power MGMS toutes versions using Shared HIS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP Open Controller (incl. SIPLUS variants) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V13.2 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) versions ant\u00e9rieures \u00e0 V1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 (6GK5615-0AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX Series toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF185C (6GT2002-0JE10) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM853-1 (RoW) (6GK5853-2EA00-2AA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "EN100 Ethernet module PROFINET IO variant toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM Advanced toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Logon toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV550 S (6GF3550-0CD10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV550 H (6GF3550-0GE10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIM 1531 IRC (6GK7543-1MX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix SAML Module (Mendix 8 compatible) versions ant\u00e9rieures \u00e0 2.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "APOGEE PXC Modular (P2 Ethernet) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V13.3 versions ant\u00e9rieures \u00e0 V13.3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Active Workspace V6.0 versions ant\u00e9rieures \u00e0 V6.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions versions ant\u00e9rieures \u00e0 V2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix SAML Module (Mendix 7 compatible) versions ant\u00e9rieures \u00e0 1.16.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "EN100 Ethernet module DNP3 IP variant toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Industrial Edge - PROFINET IO Connector toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROS Series toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal V17 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TALON TC Modular (BACnet) versions ant\u00e9rieures \u00e0 V3.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS 7 TeleControl toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "APOGEE PXC Compact (BACnet) versions ant\u00e9rieures \u00e0 V3.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (NAM) (6GK5856-2EA00-3BA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF685R (6GT2811-6CA10) versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEMA Server V14 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions versions ant\u00e9rieures \u00e0 V2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF680R (6GT2811-6AA10) versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV560 U (6GF3560-0LE10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Industrial Edge - SIMATIC S7 Connector App versions ant\u00e9rieures \u00e0 V1.7.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEC INS toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions versions ant\u00e9rieures \u00e0 V2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Administrator toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TeleControl Server Basic V3 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINAUT ST7CC toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC NET PC Software V17 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Spectrum Power 7 toutes versions using Shared HIS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV560 X (6GF3560-0HE10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 Software Controller (incl. F) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 3.0 SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Industrial Edge - OPC UA Connector toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Active Workspace V5.2 versions ant\u00e9rieures \u00e0 V5.2.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions versions ant\u00e9rieures \u00e0 V2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEC NMS toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix SAML Module (Mendix 9 compatible) versions ant\u00e9rieures \u00e0 3.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V14.0 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF615R (6GT2811-6CC10) versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF186CI (6GT2002-0JE50) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1628 (6GK1162-8AA00) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM GridEdge Essential with GDS Intel (6MD7881-2AA20) versions ant\u00e9rieures \u00e0 V2.6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V13.1 versions ant\u00e9rieures \u00e0 V13.1.0.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions versions ant\u00e9rieures \u00e0 V2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV540 S (6GF3540-0CD10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM NMS toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-32285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32285"
    },
    {
      "name": "CVE-2022-32286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32286"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2021-20317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
    },
    {
      "name": "CVE-2022-32258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32258"
    },
    {
      "name": "CVE-2021-41091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
    },
    {
      "name": "CVE-2021-22925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
    },
    {
      "name": "CVE-2022-30231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30231"
    },
    {
      "name": "CVE-2021-33196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
    },
    {
      "name": "CVE-2022-32254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32254"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2022-32145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32145"
    },
    {
      "name": "CVE-2022-32259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32259"
    },
    {
      "name": "CVE-2022-32262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32262"
    },
    {
      "name": "CVE-2017-9947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9947"
    },
    {
      "name": "CVE-2022-32255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32255"
    },
    {
      "name": "CVE-2020-27304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27304"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2022-32252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32252"
    },
    {
      "name": "CVE-2021-22924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
    },
    {
      "name": "CVE-2022-25313",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25313"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2021-37182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37182"
    },
    {
      "name": "CVE-2020-9272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9272"
    },
    {
      "name": "CVE-2021-39293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
    },
    {
      "name": "CVE-2021-33910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2022-25314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
    },
    {
      "name": "CVE-2022-23990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
    },
    {
      "name": "CVE-2022-26476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26476"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2022-0847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
    },
    {
      "name": "CVE-2022-30228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30228"
    },
    {
      "name": "CVE-2021-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
    },
    {
      "name": "CVE-2021-41092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41092"
    },
    {
      "name": "CVE-2022-32251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32251"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2021-36221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
    },
    {
      "name": "CVE-2021-41089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
    },
    {
      "name": "CVE-2022-30230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30230"
    },
    {
      "name": "CVE-2020-9273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9273"
    },
    {
      "name": "CVE-2022-30229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30229"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-29034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29034"
    },
    {
      "name": "CVE-2022-30937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30937"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2022-27219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27219"
    },
    {
      "name": "CVE-2022-27221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27221"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-31619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31619"
    },
    {
      "name": "CVE-2022-32261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32261"
    },
    {
      "name": "CVE-2022-32260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32260"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2022-27220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27220"
    },
    {
      "name": "CVE-2022-31465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31465"
    },
    {
      "name": "CVE-2017-9946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9946"
    },
    {
      "name": "CVE-2021-41103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41103"
    },
    {
      "name": "CVE-2022-32253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32253"
    },
    {
      "name": "CVE-2022-32256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32256"
    },
    {
      "name": "CVE-2021-37209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37209"
    }
  ],
  "initial_release_date": "2022-06-15T00:00:00",
  "last_revision_date": "2022-06-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-547",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-06-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-148078 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-148078.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-220589 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-220589.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-988345 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-988345.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-484086 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-484086.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-330556 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-330556.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-145224 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-145224.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-685781 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-685781.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-693555 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-693555.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-911567 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-911567.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-401167 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-401167.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-764417 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-764417.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-712929 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-712929.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-679335 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-679335.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-388239 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-388239.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-631336 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-631336.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-740594 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-740594.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-222547 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-222547.html"
    }
  ]
}
  CERTFR-2021-AVI-713
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Apache httpd. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Apache httpd versions ant\u00e9rieures \u00e0 2.4.49",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apache",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-36160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36160"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2021-33193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33193"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    }
  ],
  "initial_release_date": "2021-09-16T00:00:00",
  "last_revision_date": "2021-09-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-713",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apache httpd. Elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apache httpd",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apache CHANGES_2.4.49 du 16 septembre 2021",
      "url": "https://downloads.apache.org/httpd/CHANGES_2.4.49"
    }
  ]
}
  CERTFR-2021-AVI-931
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Cisco Cloud Services Platform 2100 versions antérieures à 2.8.2 (avril 2022) | ||
| Cisco | N/A | Cisco UCS Director Bare Metal Agent versions antérieures à 6.8.1.1 (février 2022) | ||
| Cisco | N/A | Cisco TelePresence Video Communication Server (VCS) versions antérieures à 14.0.4 et 14.1 (indisponible pour l'instant) | ||
| Cisco | N/A | Cisco Prime Optical for Service Providers | ||
| Cisco | N/A | Cisco Wireless Gateway for LoRaWAN | ||
| Cisco | N/A | Cisco FXOS Software for Firepower 4100/9300 Series Appliances | ||
| Cisco | N/A | Cisco Policy Suite versions antérieures à 22.1 (mai 2022) | ||
| Cisco | N/A | Cisco UCS Central Software | ||
| Cisco | Expressway Series | Cisco Expressway Series versions antérieures à 14.0.4 et 14.1 (indisponible pour l'instant) | ||
| Cisco | N/A | Cisco Wide Area Application Services (WAAS) | ||
| Cisco | N/A | Cisco Security Manager versions antérieures à 4.25 | ||
| Cisco | N/A | Cisco Prime Collaboration Provisioning | ||
| Cisco | N/A | Cisco UCS Manager | ||
| Cisco | N/A | Cisco Network Assurance Engine | ||
| Cisco | N/A | Cisco Prime Infrastructure versions antérieures à 3.10 | ||
| Cisco | N/A | Cisco Firepower Management Center versions antérieures à 7.02 et 7.1.0.1 (mai 2022) | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cisco Cloud Services Platform 2100 versions ant\u00e9rieures \u00e0 2.8.2 (avril 2022)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco UCS Director Bare Metal Agent versions ant\u00e9rieures \u00e0 6.8.1.1 (f\u00e9vrier 2022)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco TelePresence Video Communication Server (VCS) versions ant\u00e9rieures \u00e0 14.0.4 et 14.1 (indisponible pour l\u0027instant)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Prime Optical for Service Providers",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Wireless Gateway for LoRaWAN",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco FXOS Software for Firepower 4100/9300 Series Appliances",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Policy Suite versions ant\u00e9rieures \u00e0 22.1 (mai 2022)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco UCS Central Software",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Expressway Series versions ant\u00e9rieures \u00e0 14.0.4 et 14.1 (indisponible pour l\u0027instant)",
      "product": {
        "name": "Expressway Series",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Wide Area Application Services (WAAS)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Security Manager versions ant\u00e9rieures \u00e0 4.25",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Prime Collaboration Provisioning",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco UCS Manager",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Network Assurance Engine",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Prime Infrastructure versions ant\u00e9rieures \u00e0 3.10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Firepower Management Center versions ant\u00e9rieures \u00e0 7.02 et 7.1.0.1 (mai 2022)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-36160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36160"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2021-33193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33193"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    }
  ],
  "initial_release_date": "2021-12-10T00:00:00",
  "last_revision_date": "2021-12-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-931",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-12-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n\n\u00a0\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-apache-httpd-2.4.49-VWL69sWQ du 08 d\u00e9cembre 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
    }
  ]
}
  var-202109-1802
Vulnerability from variot
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier. This vulnerability allows remote attackers to initiate arbitrary server-side requests on affected installations of Hewlett Packard Enterprise OneView. Authentication is not required to exploit this vulnerability.The specific flaw exists within the REST service, which listens on TCP port 443 by default. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. The server is fast, reliable and extensible through a simple API. The vulnerability stems from the mod_proxy module failing to properly validate user input. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Important: httpd security update Advisory ID: RHSA-2021:3856-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3856 Issue date: 2021-10-14 CVE Names: CVE-2021-40438 =====================================================================
- Summary:
An update for httpd is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions, Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server AUS (v. 7.2) - noarch, x86_64 Red Hat Enterprise Linux Server AUS (v. 7.3) - noarch, x86_64 Red Hat Enterprise Linux Server AUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux Server AUS (v. 7.6) - noarch, x86_64 Red Hat Enterprise Linux Server AUS (v. 7.7) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.6) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.7) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.7) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.6) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.7) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.6) - noarch, x86_64 Red Hat Enterprise Linux Server TUS (v. 7.7) - noarch, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Security Fix(es):
- httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon will be restarted automatically.
- Bugs fixed (https://bugzilla.redhat.com/):
2005117 - CVE-2021-40438 httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:"
- Package List:
Red Hat Enterprise Linux Client Optional (v. 7):
Source: httpd-2.4.6-97.el7_9.1.src.rpm
noarch: httpd-manual-2.4.6-97.el7_9.1.noarch.rpm
x86_64: httpd-2.4.6-97.el7_9.1.x86_64.rpm httpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm httpd-devel-2.4.6-97.el7_9.1.x86_64.rpm httpd-tools-2.4.6-97.el7_9.1.x86_64.rpm mod_ldap-2.4.6-97.el7_9.1.x86_64.rpm mod_proxy_html-2.4.6-97.el7_9.1.x86_64.rpm mod_session-2.4.6-97.el7_9.1.x86_64.rpm mod_ssl-2.4.6-97.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
Source: httpd-2.4.6-97.el7_9.1.src.rpm
noarch: httpd-manual-2.4.6-97.el7_9.1.noarch.rpm
x86_64: httpd-2.4.6-97.el7_9.1.x86_64.rpm httpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm httpd-devel-2.4.6-97.el7_9.1.x86_64.rpm httpd-tools-2.4.6-97.el7_9.1.x86_64.rpm mod_ldap-2.4.6-97.el7_9.1.x86_64.rpm mod_proxy_html-2.4.6-97.el7_9.1.x86_64.rpm mod_session-2.4.6-97.el7_9.1.x86_64.rpm mod_ssl-2.4.6-97.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 7.2):
Source: httpd-2.4.6-40.el7_2.7.src.rpm
noarch: httpd-manual-2.4.6-40.el7_2.7.noarch.rpm
x86_64: httpd-2.4.6-40.el7_2.7.x86_64.rpm httpd-debuginfo-2.4.6-40.el7_2.7.x86_64.rpm httpd-devel-2.4.6-40.el7_2.7.x86_64.rpm httpd-tools-2.4.6-40.el7_2.7.x86_64.rpm mod_ssl-2.4.6-40.el7_2.7.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 7.3):
Source: httpd-2.4.6-45.el7_3.6.src.rpm
noarch: httpd-manual-2.4.6-45.el7_3.6.noarch.rpm
x86_64: httpd-2.4.6-45.el7_3.6.x86_64.rpm httpd-debuginfo-2.4.6-45.el7_3.6.x86_64.rpm httpd-devel-2.4.6-45.el7_3.6.x86_64.rpm httpd-tools-2.4.6-45.el7_3.6.x86_64.rpm mod_ssl-2.4.6-45.el7_3.6.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 7.4):
Source: httpd-2.4.6-67.el7_4.7.src.rpm
noarch: httpd-manual-2.4.6-67.el7_4.7.noarch.rpm
x86_64: httpd-2.4.6-67.el7_4.7.x86_64.rpm httpd-debuginfo-2.4.6-67.el7_4.7.x86_64.rpm httpd-devel-2.4.6-67.el7_4.7.x86_64.rpm httpd-tools-2.4.6-67.el7_4.7.x86_64.rpm mod_session-2.4.6-67.el7_4.7.x86_64.rpm mod_ssl-2.4.6-67.el7_4.7.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 7.6):
Source: httpd-2.4.6-89.el7_6.2.src.rpm
noarch: httpd-manual-2.4.6-89.el7_6.2.noarch.rpm
x86_64: httpd-2.4.6-89.el7_6.2.x86_64.rpm httpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm httpd-devel-2.4.6-89.el7_6.2.x86_64.rpm httpd-tools-2.4.6-89.el7_6.2.x86_64.rpm mod_session-2.4.6-89.el7_6.2.x86_64.rpm mod_ssl-2.4.6-89.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.6):
Source: httpd-2.4.6-89.el7_6.2.src.rpm
noarch: httpd-manual-2.4.6-89.el7_6.2.noarch.rpm
ppc64le: httpd-2.4.6-89.el7_6.2.ppc64le.rpm httpd-debuginfo-2.4.6-89.el7_6.2.ppc64le.rpm httpd-devel-2.4.6-89.el7_6.2.ppc64le.rpm httpd-tools-2.4.6-89.el7_6.2.ppc64le.rpm mod_session-2.4.6-89.el7_6.2.ppc64le.rpm mod_ssl-2.4.6-89.el7_6.2.ppc64le.rpm
x86_64: httpd-2.4.6-89.el7_6.2.x86_64.rpm httpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm httpd-devel-2.4.6-89.el7_6.2.x86_64.rpm httpd-tools-2.4.6-89.el7_6.2.x86_64.rpm mod_session-2.4.6-89.el7_6.2.x86_64.rpm mod_ssl-2.4.6-89.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.6):
Source: httpd-2.4.6-89.el7_6.2.src.rpm
noarch: httpd-manual-2.4.6-89.el7_6.2.noarch.rpm
x86_64: httpd-2.4.6-89.el7_6.2.x86_64.rpm httpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm httpd-devel-2.4.6-89.el7_6.2.x86_64.rpm httpd-tools-2.4.6-89.el7_6.2.x86_64.rpm mod_session-2.4.6-89.el7_6.2.x86_64.rpm mod_ssl-2.4.6-89.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 7.7):
Source: httpd-2.4.6-90.el7_7.1.src.rpm
noarch: httpd-manual-2.4.6-90.el7_7.1.noarch.rpm
x86_64: httpd-2.4.6-90.el7_7.1.x86_64.rpm httpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm httpd-devel-2.4.6-90.el7_7.1.x86_64.rpm httpd-tools-2.4.6-90.el7_7.1.x86_64.rpm mod_session-2.4.6-90.el7_7.1.x86_64.rpm mod_ssl-2.4.6-90.el7_7.1.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.7):
Source: httpd-2.4.6-90.el7_7.1.src.rpm
noarch: httpd-manual-2.4.6-90.el7_7.1.noarch.rpm
ppc64le: httpd-2.4.6-90.el7_7.1.ppc64le.rpm httpd-debuginfo-2.4.6-90.el7_7.1.ppc64le.rpm httpd-devel-2.4.6-90.el7_7.1.ppc64le.rpm httpd-tools-2.4.6-90.el7_7.1.ppc64le.rpm mod_session-2.4.6-90.el7_7.1.ppc64le.rpm mod_ssl-2.4.6-90.el7_7.1.ppc64le.rpm
x86_64: httpd-2.4.6-90.el7_7.1.x86_64.rpm httpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm httpd-devel-2.4.6-90.el7_7.1.x86_64.rpm httpd-tools-2.4.6-90.el7_7.1.x86_64.rpm mod_session-2.4.6-90.el7_7.1.x86_64.rpm mod_ssl-2.4.6-90.el7_7.1.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.7):
Source: httpd-2.4.6-90.el7_7.1.src.rpm
noarch: httpd-manual-2.4.6-90.el7_7.1.noarch.rpm
x86_64: httpd-2.4.6-90.el7_7.1.x86_64.rpm httpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm httpd-devel-2.4.6-90.el7_7.1.x86_64.rpm httpd-tools-2.4.6-90.el7_7.1.x86_64.rpm mod_session-2.4.6-90.el7_7.1.x86_64.rpm mod_ssl-2.4.6-90.el7_7.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: httpd-2.4.6-97.el7_9.1.src.rpm
noarch: httpd-manual-2.4.6-97.el7_9.1.noarch.rpm
ppc64: httpd-2.4.6-97.el7_9.1.ppc64.rpm httpd-debuginfo-2.4.6-97.el7_9.1.ppc64.rpm httpd-devel-2.4.6-97.el7_9.1.ppc64.rpm httpd-tools-2.4.6-97.el7_9.1.ppc64.rpm mod_session-2.4.6-97.el7_9.1.ppc64.rpm mod_ssl-2.4.6-97.el7_9.1.ppc64.rpm
ppc64le: httpd-2.4.6-97.el7_9.1.ppc64le.rpm httpd-debuginfo-2.4.6-97.el7_9.1.ppc64le.rpm httpd-devel-2.4.6-97.el7_9.1.ppc64le.rpm httpd-tools-2.4.6-97.el7_9.1.ppc64le.rpm mod_session-2.4.6-97.el7_9.1.ppc64le.rpm mod_ssl-2.4.6-97.el7_9.1.ppc64le.rpm
s390x: httpd-2.4.6-97.el7_9.1.s390x.rpm httpd-debuginfo-2.4.6-97.el7_9.1.s390x.rpm httpd-devel-2.4.6-97.el7_9.1.s390x.rpm httpd-tools-2.4.6-97.el7_9.1.s390x.rpm mod_session-2.4.6-97.el7_9.1.s390x.rpm mod_ssl-2.4.6-97.el7_9.1.s390x.rpm
x86_64: httpd-2.4.6-97.el7_9.1.x86_64.rpm httpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm httpd-devel-2.4.6-97.el7_9.1.x86_64.rpm httpd-tools-2.4.6-97.el7_9.1.x86_64.rpm mod_session-2.4.6-97.el7_9.1.x86_64.rpm mod_ssl-2.4.6-97.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.2):
x86_64: httpd-debuginfo-2.4.6-40.el7_2.7.x86_64.rpm mod_ldap-2.4.6-40.el7_2.7.x86_64.rpm mod_proxy_html-2.4.6-40.el7_2.7.x86_64.rpm mod_session-2.4.6-40.el7_2.7.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.3):
x86_64: httpd-debuginfo-2.4.6-45.el7_3.6.x86_64.rpm mod_ldap-2.4.6-45.el7_3.6.x86_64.rpm mod_proxy_html-2.4.6-45.el7_3.6.x86_64.rpm mod_session-2.4.6-45.el7_3.6.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.4):
x86_64: httpd-debuginfo-2.4.6-67.el7_4.7.x86_64.rpm mod_ldap-2.4.6-67.el7_4.7.x86_64.rpm mod_proxy_html-2.4.6-67.el7_4.7.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.6):
x86_64: httpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm mod_ldap-2.4.6-89.el7_6.2.x86_64.rpm mod_proxy_html-2.4.6-89.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional E4S (v. 7.6):
ppc64le: httpd-debuginfo-2.4.6-89.el7_6.2.ppc64le.rpm mod_ldap-2.4.6-89.el7_6.2.ppc64le.rpm mod_proxy_html-2.4.6-89.el7_6.2.ppc64le.rpm
x86_64: httpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm mod_ldap-2.4.6-89.el7_6.2.x86_64.rpm mod_proxy_html-2.4.6-89.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 7.6):
x86_64: httpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm mod_ldap-2.4.6-89.el7_6.2.x86_64.rpm mod_proxy_html-2.4.6-89.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.7):
x86_64: httpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm mod_ldap-2.4.6-90.el7_7.1.x86_64.rpm mod_proxy_html-2.4.6-90.el7_7.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional E4S (v. 7.6):
ppc64le: httpd-debuginfo-2.4.6-90.el7_7.1.ppc64le.rpm mod_ldap-2.4.6-90.el7_7.1.ppc64le.rpm mod_proxy_html-2.4.6-90.el7_7.1.ppc64le.rpm
x86_64: httpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm mod_ldap-2.4.6-90.el7_7.1.x86_64.rpm mod_proxy_html-2.4.6-90.el7_7.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 7.7):
x86_64: httpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm mod_ldap-2.4.6-90.el7_7.1.x86_64.rpm mod_proxy_html-2.4.6-90.el7_7.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: httpd-debuginfo-2.4.6-97.el7_9.1.ppc64.rpm mod_ldap-2.4.6-97.el7_9.1.ppc64.rpm mod_proxy_html-2.4.6-97.el7_9.1.ppc64.rpm
ppc64le: httpd-debuginfo-2.4.6-97.el7_9.1.ppc64le.rpm mod_ldap-2.4.6-97.el7_9.1.ppc64le.rpm mod_proxy_html-2.4.6-97.el7_9.1.ppc64le.rpm
s390x: httpd-debuginfo-2.4.6-97.el7_9.1.s390x.rpm mod_ldap-2.4.6-97.el7_9.1.s390x.rpm mod_proxy_html-2.4.6-97.el7_9.1.s390x.rpm
x86_64: httpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm mod_ldap-2.4.6-97.el7_9.1.x86_64.rpm mod_proxy_html-2.4.6-97.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: httpd-2.4.6-97.el7_9.1.src.rpm
noarch: httpd-manual-2.4.6-97.el7_9.1.noarch.rpm
x86_64: httpd-2.4.6-97.el7_9.1.x86_64.rpm httpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm httpd-devel-2.4.6-97.el7_9.1.x86_64.rpm httpd-tools-2.4.6-97.el7_9.1.x86_64.rpm mod_session-2.4.6-97.el7_9.1.x86_64.rpm mod_ssl-2.4.6-97.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: httpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm mod_ldap-2.4.6-97.el7_9.1.x86_64.rpm mod_proxy_html-2.4.6-97.el7_9.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2021-40438 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYWfxl9zjgjWX9erEAQiHUQ//augswljuYjRC9IwK5XgDLjrigqEshGaa v5C3gfY1a4SwE/x0FQCawiBmh+8VMv5as3c0eeU5C6QB/05BSBycgboIZG3H6HdF sNOxNzkcG6WmooNZNJ0/c/ykvkn0tRq812yzDTxr2IB3+LxH5cYaw9wQnt62l3yF gjtWedH9xntGpqrVK17NVe/o9Jg4tL0CEPDk+NrbXeSgwnAnLKsLjpwQT72+GVJx ZLC9DYkFguzQN+wckKPRfxGtce0GtuXHkpEShCnH32RPrNyImFMn/Nc8IyOmTadT jCd07H2MNH6+Txxt6dh2aI+SI5JwdeGRNP7IXs86H+KPNZhphS/BqFt3qHGTsw4l 3f6jGfywbWfNdLw+s0qHaWvJ2ZgTw7O1QPncfozKn8cU3Rw9OunN+r2yVTcU3KW9 0ZGHpej56UhthE1qqS5vQjUPQ6SQgC1QHGDNgYkZk0mqIL3Vkv6gEqIF8TH4ezxZ LhZcY3N6HI5LC7568idurO0uLTdjPZq8+xMmDDAXA4QvIxOsOk6x4Rf1dzCtDpGo QSzxx6a6uYXF7EWIlkaR/qY5zcyk4i8aJN8yzrxu6oNulVSIsSuMnb00SIOk8cX7 lUt5V1/RhnWSRytHE5Tz68PyfNyqgJwFDg8D/p0nxZE1Q3tXmgtLwPOY0l2zkkjB 95kGnxWCYaA= =gPcK -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 8) - aarch64, noarch, ppc64le, s390x, x86_64
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. Refer to the Release Notes for information on the security fix included in this release. Solution:
Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link for the update. You must be logged in to download the update. ========================================================================== Ubuntu Security Notice USN-5090-4 September 28, 2021
apache2 regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
USN-5090-1 introduced a regression in Apache HTTP Server. One of the upstream fixes introduced a regression in UDS URIs. This update fixes the problem.
Original advisory details:
James Kettle discovered that the Apache HTTP Server HTTP/2 module incorrectly handled certain crafted methods. A remote attacker could possibly use this issue to perform request splitting or cache poisoning attacks. (CVE-2021-34798)
Li Zhi Xin discovered that the Apache mod_proxy_uwsgi module incorrectly handled certain request uri-paths. This issue only affected Ubuntu 20.04 LTS and Ubuntu 21.04. If the server was configured with third-party modules, a remote attacker could use this issue to cause the server to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-39275)
It was discovered that the Apache mod_proxy module incorrectly handled certain request uri-paths. (CVE-2021-40438)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 ESM: apache2 2.4.18-2ubuntu3.17+esm3 apache2-bin 2.4.18-2ubuntu3.17+esm3
In general, a standard system update will make all the necessary changes
Show details on source website{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1802",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sinema remote connect server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.1"
      },
      {
        "model": "cloud backup",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "f5os",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "1.2.0"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "34"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "35"
      },
      {
        "model": "storagegrid",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "11.0"
      },
      {
        "model": "instantis enterprisetrack",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "17.3"
      },
      {
        "model": "secure global desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.6"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "ruggedcom nms",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "brocade fabric operating system",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": "sinema remote connect server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.2"
      },
      {
        "model": "clustered data ontap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "model": "http server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "apache",
        "version": "2.4.48"
      },
      {
        "model": "enterprise manager ops center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12.4.0.0"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12.2.1.4.0"
      },
      {
        "model": "sinema server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "14.0"
      },
      {
        "model": "f5os",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "1.1.4"
      },
      {
        "model": "instantis enterprisetrack",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "17.1"
      },
      {
        "model": "zfs storage appliance kit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8.8"
      },
      {
        "model": "tenable.sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "tenable",
        "version": "5.19.1"
      },
      {
        "model": "f5os",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "1.2.1"
      },
      {
        "model": "instantis enterprisetrack",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "17.2"
      },
      {
        "model": "f5os",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "1.1.0"
      },
      {
        "model": "sinec nms",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "1.0.3"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12.2.1.3.0"
      },
      {
        "model": "hitachi infrastructure analytics advisor",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u7acb",
        "version": null
      },
      {
        "model": "fedora",
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": "clustered data ontap",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "hitachi ops center api configuration manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u7acb",
        "version": null
      },
      {
        "model": "http server",
        "scope": null,
        "trust": 0.8,
        "vendor": "apache",
        "version": null
      },
      {
        "model": "f5os",
        "scope": null,
        "trust": 0.8,
        "vendor": "f5",
        "version": null
      },
      {
        "model": "storagegrid",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "hitachi configuration manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u7acb",
        "version": null
      },
      {
        "model": "hitachi device manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u7acb",
        "version": null
      },
      {
        "model": "hitachi ops center analyzer",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u7acb",
        "version": null
      },
      {
        "model": "oneview",
        "scope": null,
        "trust": 0.7,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "http server",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "apache",
        "version": "\u003c=2.4.48"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-24-812"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40438"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Anonymous",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-24-812"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2021-40438",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2021-40438",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2022-03224",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-401786",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.2,
            "id": "CVE-2021-40438",
            "impactScore": 6.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.0,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2021-40438",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "NONE",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-40438",
            "impactScore": 4.2,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "NONE",
            "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-40438",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-40438",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "ZDI",
            "id": "CVE-2021-40438",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2022-03224",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202109-1094",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-401786",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-40438",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-24-812"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-401786"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-40438"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202109-1094"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40438"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier. This vulnerability allows remote attackers to initiate arbitrary server-side requests on affected installations of Hewlett Packard Enterprise OneView. Authentication is not required to exploit this vulnerability.The specific flaw exists within the REST service, which listens on TCP port 443 by default. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. The server is fast, reliable and extensible through a simple API. The vulnerability stems from the mod_proxy module failing to properly validate user input. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: httpd security update\nAdvisory ID:       RHSA-2021:3856-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:3856\nIssue date:        2021-10-14\nCVE Names:         CVE-2021-40438 \n=====================================================================\n\n1. Summary:\n\nAn update for httpd is now available for Red Hat Enterprise Linux 7, Red\nHat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux\n7.3 Advanced Update Support, Red Hat Enterprise Linux 7.4 Advanced Update\nSupport, Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat\nEnterprise Linux 7.6 Telco Extended Update Support, Red Hat Enterprise\nLinux 7.6 Update Services for SAP Solutions, Red Hat Enterprise Linux 7.7\nAdvanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update\nSupport, and Red Hat Enterprise Linux 7.7 Update Services for SAP\nSolutions. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server AUS (v. 7.2) - noarch, x86_64\nRed Hat Enterprise Linux Server AUS (v. 7.3) - noarch, x86_64\nRed Hat Enterprise Linux Server AUS (v. 7.4) - noarch, x86_64\nRed Hat Enterprise Linux Server AUS (v. 7.6) - noarch, x86_64\nRed Hat Enterprise Linux Server AUS (v. 7.7) - noarch, x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.6) - noarch, ppc64le, x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.7) - noarch, ppc64le, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 7.2) - x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 7.6) - x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 7.7) - x86_64\nRed Hat Enterprise Linux Server Optional E4S (v. 7.6) - ppc64le, x86_64\nRed Hat Enterprise Linux Server Optional TUS (v. 7.6) - x86_64\nRed Hat Enterprise Linux Server Optional TUS (v. 7.7) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.6) - noarch, x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. \n\nSecurity Fix(es):\n\n* httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"\n(CVE-2021-40438)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n2005117 - CVE-2021-40438 httpd: mod_proxy: SSRF via a crafted request uri-path containing \"unix:\"\n\n6. Package List:\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nSource:\nhttpd-2.4.6-97.el7_9.1.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-97.el7_9.1.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-devel-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-tools-2.4.6-97.el7_9.1.x86_64.rpm\nmod_ldap-2.4.6-97.el7_9.1.x86_64.rpm\nmod_proxy_html-2.4.6-97.el7_9.1.x86_64.rpm\nmod_session-2.4.6-97.el7_9.1.x86_64.rpm\nmod_ssl-2.4.6-97.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nSource:\nhttpd-2.4.6-97.el7_9.1.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-97.el7_9.1.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-devel-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-tools-2.4.6-97.el7_9.1.x86_64.rpm\nmod_ldap-2.4.6-97.el7_9.1.x86_64.rpm\nmod_proxy_html-2.4.6-97.el7_9.1.x86_64.rpm\nmod_session-2.4.6-97.el7_9.1.x86_64.rpm\nmod_ssl-2.4.6-97.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 7.2):\n\nSource:\nhttpd-2.4.6-40.el7_2.7.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-40.el7_2.7.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-40.el7_2.7.x86_64.rpm\nhttpd-debuginfo-2.4.6-40.el7_2.7.x86_64.rpm\nhttpd-devel-2.4.6-40.el7_2.7.x86_64.rpm\nhttpd-tools-2.4.6-40.el7_2.7.x86_64.rpm\nmod_ssl-2.4.6-40.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 7.3):\n\nSource:\nhttpd-2.4.6-45.el7_3.6.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-45.el7_3.6.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-45.el7_3.6.x86_64.rpm\nhttpd-debuginfo-2.4.6-45.el7_3.6.x86_64.rpm\nhttpd-devel-2.4.6-45.el7_3.6.x86_64.rpm\nhttpd-tools-2.4.6-45.el7_3.6.x86_64.rpm\nmod_ssl-2.4.6-45.el7_3.6.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 7.4):\n\nSource:\nhttpd-2.4.6-67.el7_4.7.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-67.el7_4.7.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-67.el7_4.7.x86_64.rpm\nhttpd-debuginfo-2.4.6-67.el7_4.7.x86_64.rpm\nhttpd-devel-2.4.6-67.el7_4.7.x86_64.rpm\nhttpd-tools-2.4.6-67.el7_4.7.x86_64.rpm\nmod_session-2.4.6-67.el7_4.7.x86_64.rpm\nmod_ssl-2.4.6-67.el7_4.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 7.6):\n\nSource:\nhttpd-2.4.6-89.el7_6.2.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-89.el7_6.2.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-89.el7_6.2.x86_64.rpm\nhttpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm\nhttpd-devel-2.4.6-89.el7_6.2.x86_64.rpm\nhttpd-tools-2.4.6-89.el7_6.2.x86_64.rpm\nmod_session-2.4.6-89.el7_6.2.x86_64.rpm\nmod_ssl-2.4.6-89.el7_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.6):\n\nSource:\nhttpd-2.4.6-89.el7_6.2.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-89.el7_6.2.noarch.rpm\n\nppc64le:\nhttpd-2.4.6-89.el7_6.2.ppc64le.rpm\nhttpd-debuginfo-2.4.6-89.el7_6.2.ppc64le.rpm\nhttpd-devel-2.4.6-89.el7_6.2.ppc64le.rpm\nhttpd-tools-2.4.6-89.el7_6.2.ppc64le.rpm\nmod_session-2.4.6-89.el7_6.2.ppc64le.rpm\nmod_ssl-2.4.6-89.el7_6.2.ppc64le.rpm\n\nx86_64:\nhttpd-2.4.6-89.el7_6.2.x86_64.rpm\nhttpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm\nhttpd-devel-2.4.6-89.el7_6.2.x86_64.rpm\nhttpd-tools-2.4.6-89.el7_6.2.x86_64.rpm\nmod_session-2.4.6-89.el7_6.2.x86_64.rpm\nmod_ssl-2.4.6-89.el7_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.6):\n\nSource:\nhttpd-2.4.6-89.el7_6.2.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-89.el7_6.2.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-89.el7_6.2.x86_64.rpm\nhttpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm\nhttpd-devel-2.4.6-89.el7_6.2.x86_64.rpm\nhttpd-tools-2.4.6-89.el7_6.2.x86_64.rpm\nmod_session-2.4.6-89.el7_6.2.x86_64.rpm\nmod_ssl-2.4.6-89.el7_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 7.7):\n\nSource:\nhttpd-2.4.6-90.el7_7.1.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-90.el7_7.1.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-90.el7_7.1.x86_64.rpm\nhttpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm\nhttpd-devel-2.4.6-90.el7_7.1.x86_64.rpm\nhttpd-tools-2.4.6-90.el7_7.1.x86_64.rpm\nmod_session-2.4.6-90.el7_7.1.x86_64.rpm\nmod_ssl-2.4.6-90.el7_7.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.7):\n\nSource:\nhttpd-2.4.6-90.el7_7.1.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-90.el7_7.1.noarch.rpm\n\nppc64le:\nhttpd-2.4.6-90.el7_7.1.ppc64le.rpm\nhttpd-debuginfo-2.4.6-90.el7_7.1.ppc64le.rpm\nhttpd-devel-2.4.6-90.el7_7.1.ppc64le.rpm\nhttpd-tools-2.4.6-90.el7_7.1.ppc64le.rpm\nmod_session-2.4.6-90.el7_7.1.ppc64le.rpm\nmod_ssl-2.4.6-90.el7_7.1.ppc64le.rpm\n\nx86_64:\nhttpd-2.4.6-90.el7_7.1.x86_64.rpm\nhttpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm\nhttpd-devel-2.4.6-90.el7_7.1.x86_64.rpm\nhttpd-tools-2.4.6-90.el7_7.1.x86_64.rpm\nmod_session-2.4.6-90.el7_7.1.x86_64.rpm\nmod_ssl-2.4.6-90.el7_7.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.7):\n\nSource:\nhttpd-2.4.6-90.el7_7.1.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-90.el7_7.1.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-90.el7_7.1.x86_64.rpm\nhttpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm\nhttpd-devel-2.4.6-90.el7_7.1.x86_64.rpm\nhttpd-tools-2.4.6-90.el7_7.1.x86_64.rpm\nmod_session-2.4.6-90.el7_7.1.x86_64.rpm\nmod_ssl-2.4.6-90.el7_7.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nhttpd-2.4.6-97.el7_9.1.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-97.el7_9.1.noarch.rpm\n\nppc64:\nhttpd-2.4.6-97.el7_9.1.ppc64.rpm\nhttpd-debuginfo-2.4.6-97.el7_9.1.ppc64.rpm\nhttpd-devel-2.4.6-97.el7_9.1.ppc64.rpm\nhttpd-tools-2.4.6-97.el7_9.1.ppc64.rpm\nmod_session-2.4.6-97.el7_9.1.ppc64.rpm\nmod_ssl-2.4.6-97.el7_9.1.ppc64.rpm\n\nppc64le:\nhttpd-2.4.6-97.el7_9.1.ppc64le.rpm\nhttpd-debuginfo-2.4.6-97.el7_9.1.ppc64le.rpm\nhttpd-devel-2.4.6-97.el7_9.1.ppc64le.rpm\nhttpd-tools-2.4.6-97.el7_9.1.ppc64le.rpm\nmod_session-2.4.6-97.el7_9.1.ppc64le.rpm\nmod_ssl-2.4.6-97.el7_9.1.ppc64le.rpm\n\ns390x:\nhttpd-2.4.6-97.el7_9.1.s390x.rpm\nhttpd-debuginfo-2.4.6-97.el7_9.1.s390x.rpm\nhttpd-devel-2.4.6-97.el7_9.1.s390x.rpm\nhttpd-tools-2.4.6-97.el7_9.1.s390x.rpm\nmod_session-2.4.6-97.el7_9.1.s390x.rpm\nmod_ssl-2.4.6-97.el7_9.1.s390x.rpm\n\nx86_64:\nhttpd-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-devel-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-tools-2.4.6-97.el7_9.1.x86_64.rpm\nmod_session-2.4.6-97.el7_9.1.x86_64.rpm\nmod_ssl-2.4.6-97.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 7.2):\n\nx86_64:\nhttpd-debuginfo-2.4.6-40.el7_2.7.x86_64.rpm\nmod_ldap-2.4.6-40.el7_2.7.x86_64.rpm\nmod_proxy_html-2.4.6-40.el7_2.7.x86_64.rpm\nmod_session-2.4.6-40.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 7.3):\n\nx86_64:\nhttpd-debuginfo-2.4.6-45.el7_3.6.x86_64.rpm\nmod_ldap-2.4.6-45.el7_3.6.x86_64.rpm\nmod_proxy_html-2.4.6-45.el7_3.6.x86_64.rpm\nmod_session-2.4.6-45.el7_3.6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 7.4):\n\nx86_64:\nhttpd-debuginfo-2.4.6-67.el7_4.7.x86_64.rpm\nmod_ldap-2.4.6-67.el7_4.7.x86_64.rpm\nmod_proxy_html-2.4.6-67.el7_4.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 7.6):\n\nx86_64:\nhttpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm\nmod_ldap-2.4.6-89.el7_6.2.x86_64.rpm\nmod_proxy_html-2.4.6-89.el7_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional E4S (v. 7.6):\n\nppc64le:\nhttpd-debuginfo-2.4.6-89.el7_6.2.ppc64le.rpm\nmod_ldap-2.4.6-89.el7_6.2.ppc64le.rpm\nmod_proxy_html-2.4.6-89.el7_6.2.ppc64le.rpm\n\nx86_64:\nhttpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm\nmod_ldap-2.4.6-89.el7_6.2.x86_64.rpm\nmod_proxy_html-2.4.6-89.el7_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional TUS (v. 7.6):\n\nx86_64:\nhttpd-debuginfo-2.4.6-89.el7_6.2.x86_64.rpm\nmod_ldap-2.4.6-89.el7_6.2.x86_64.rpm\nmod_proxy_html-2.4.6-89.el7_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 7.7):\n\nx86_64:\nhttpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm\nmod_ldap-2.4.6-90.el7_7.1.x86_64.rpm\nmod_proxy_html-2.4.6-90.el7_7.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional E4S (v. 7.6):\n\nppc64le:\nhttpd-debuginfo-2.4.6-90.el7_7.1.ppc64le.rpm\nmod_ldap-2.4.6-90.el7_7.1.ppc64le.rpm\nmod_proxy_html-2.4.6-90.el7_7.1.ppc64le.rpm\n\nx86_64:\nhttpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm\nmod_ldap-2.4.6-90.el7_7.1.x86_64.rpm\nmod_proxy_html-2.4.6-90.el7_7.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional TUS (v. 7.7):\n\nx86_64:\nhttpd-debuginfo-2.4.6-90.el7_7.1.x86_64.rpm\nmod_ldap-2.4.6-90.el7_7.1.x86_64.rpm\nmod_proxy_html-2.4.6-90.el7_7.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nhttpd-debuginfo-2.4.6-97.el7_9.1.ppc64.rpm\nmod_ldap-2.4.6-97.el7_9.1.ppc64.rpm\nmod_proxy_html-2.4.6-97.el7_9.1.ppc64.rpm\n\nppc64le:\nhttpd-debuginfo-2.4.6-97.el7_9.1.ppc64le.rpm\nmod_ldap-2.4.6-97.el7_9.1.ppc64le.rpm\nmod_proxy_html-2.4.6-97.el7_9.1.ppc64le.rpm\n\ns390x:\nhttpd-debuginfo-2.4.6-97.el7_9.1.s390x.rpm\nmod_ldap-2.4.6-97.el7_9.1.s390x.rpm\nmod_proxy_html-2.4.6-97.el7_9.1.s390x.rpm\n\nx86_64:\nhttpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm\nmod_ldap-2.4.6-97.el7_9.1.x86_64.rpm\nmod_proxy_html-2.4.6-97.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nhttpd-2.4.6-97.el7_9.1.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-97.el7_9.1.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-devel-2.4.6-97.el7_9.1.x86_64.rpm\nhttpd-tools-2.4.6-97.el7_9.1.x86_64.rpm\nmod_session-2.4.6-97.el7_9.1.x86_64.rpm\nmod_ssl-2.4.6-97.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nhttpd-debuginfo-2.4.6-97.el7_9.1.x86_64.rpm\nmod_ldap-2.4.6-97.el7_9.1.x86_64.rpm\nmod_proxy_html-2.4.6-97.el7_9.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-40438\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n95kGnxWCYaA=\n=gPcK\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. This software, such as Apache HTTP Server, is\ncommon to multiple JBoss middleware products, and is packaged under Red Hat\nJBoss Core Services to allow for faster distribution of updates, and for a\nmore consistent update experience. Refer to the Release Notes for information on the security fix\nincluded in this release. Solution:\n\nBefore applying the update, back up your existing installation, including\nall applications, configuration files, databases and database settings, and\nso on. \n\nThe References section of this erratum contains a download link for the\nupdate. You must be logged in to download the update. ==========================================================================\nUbuntu Security Notice USN-5090-4\nSeptember 28, 2021\n\napache2 regression\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 ESM\n\nSummary:\n\nUSN-5090-1 introduced a regression in Apache HTTP Server. One of the upstream\nfixes introduced a regression in UDS URIs. This update fixes the problem. \n\nOriginal advisory details:\n\n James Kettle discovered that the Apache HTTP Server HTTP/2 module\n incorrectly handled certain crafted methods. A remote attacker could\n possibly use this issue to perform request splitting or cache poisoning\n attacks. \n (CVE-2021-34798)\n \n Li Zhi Xin discovered that the Apache mod_proxy_uwsgi module incorrectly\n handled certain request uri-paths. \n This issue only affected Ubuntu 20.04 LTS and Ubuntu 21.04. If the server was configured with third-party modules, a remote\n attacker could use this issue to cause the server to crash, resulting in a\n denial of service, or possibly execute arbitrary code. (CVE-2021-39275)\n \n It was discovered that the Apache mod_proxy module incorrectly handled\n certain request uri-paths. \n (CVE-2021-40438)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 ESM:\n  apache2                         2.4.18-2ubuntu3.17+esm3\n  apache2-bin                     2.4.18-2ubuntu3.17+esm3\n\nIn general, a standard system update will make all the necessary changes",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-40438"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      },
      {
        "db": "ZDI",
        "id": "ZDI-24-812"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-401786"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-40438"
      },
      {
        "db": "PACKETSTORM",
        "id": "164513"
      },
      {
        "db": "PACKETSTORM",
        "id": "164493"
      },
      {
        "db": "PACKETSTORM",
        "id": "164505"
      },
      {
        "db": "PACKETSTORM",
        "id": "164448"
      },
      {
        "db": "PACKETSTORM",
        "id": "164443"
      },
      {
        "db": "PACKETSTORM",
        "id": "164305"
      },
      {
        "db": "PACKETSTORM",
        "id": "164329"
      }
    ],
    "trust": 3.6
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-40438",
        "trust": 4.6
      },
      {
        "db": "SIEMENS",
        "id": "SSA-685781",
        "trust": 1.7
      },
      {
        "db": "TENABLE",
        "id": "TNS-2021-17",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004150",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-22691",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-24-812",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-03224",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "168072",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "164513",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "164505",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "164448",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "164329",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "164460",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164318",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4004.7",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4004.2",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3591",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3229",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3250",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3482",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3429",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4004.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3784",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3387",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3341",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3524",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4004.3",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3373",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.2978",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3366",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3357",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3148",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021101005",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022041953",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021091707",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021112904",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021101340",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021101922",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022011836",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022060811",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022042112",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021101906",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021102601",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021092301",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021101116",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021111732",
        "trust": 0.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-22-167-06",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202109-1094",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-401786",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-40438",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "164493",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "164443",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "164305",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-24-812"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-401786"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-40438"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      },
      {
        "db": "PACKETSTORM",
        "id": "164513"
      },
      {
        "db": "PACKETSTORM",
        "id": "164493"
      },
      {
        "db": "PACKETSTORM",
        "id": "164505"
      },
      {
        "db": "PACKETSTORM",
        "id": "164448"
      },
      {
        "db": "PACKETSTORM",
        "id": "164443"
      },
      {
        "db": "PACKETSTORM",
        "id": "164305"
      },
      {
        "db": "PACKETSTORM",
        "id": "164329"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202109-1094"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40438"
      }
    ]
  },
  "id": "VAR-202109-1802",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-401786"
      }
    ],
    "trust": 1.3031922749999998
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      }
    ]
  },
  "last_update_date": "2024-11-29T20:14:24.364000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "hitachi-sec-2021-139",
        "trust": 0.8,
        "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
      },
      {
        "title": "Hewlett Packard Enterprise has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04586en_us\u0026docLocale=en_US"
      },
      {
        "title": "Patch for Apache HTTP Server mod_proxy server request forgery vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/313356"
      },
      {
        "title": "Apache HTTP Server Fixes for code issue vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=178533"
      },
      {
        "title": "Red Hat: CVE-2021-40438",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-40438"
      },
      {
        "title": "Debian Security Advisories: DSA-4982-1 apache2 -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=93a29f7ecf9a6aaba79d3b3320aa4b85"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-40438 log"
      },
      {
        "title": "Hitachi Security Advisories: Vulnerability in Hitachi Command Suite, Hitachi Ops Center API Configuration Manager\u00ef\u00bc\u0152Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories\u0026qid=hitachi-sec-2021-139"
      },
      {
        "title": "Tenable Security Advisories: [R1] Stand-alone Security Patch Available for Tenable.sc versions 5.16.0 to 5.19.1: Patch 202110.1",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2021-17"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2021-1543",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2021-1543"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2021-1716",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2021-1716"
      },
      {
        "title": "Cisco: Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
      },
      {
        "title": "CVE-2021-40438 exploit PoC with Docker setup",
        "trust": 0.1,
        "url": "https://github.com/sixpacksecurity/CVE-2021-40438 "
      },
      {
        "title": "CVE-2021-40438",
        "trust": 0.1,
        "url": "https://github.com/gassara-kys/CVE-2021-40438 "
      },
      {
        "title": "CVE-2021-40438",
        "trust": 0.1,
        "url": "https://github.com/Kashkovsky/CVE-2021-40438 "
      },
      {
        "title": "scan_ssrf.sh",
        "trust": 0.1,
        "url": "https://github.com/vsh00t/BB-PoC "
      },
      {
        "title": "CVE-2021-40438",
        "trust": 0.1,
        "url": "https://github.com/xiaojiangxl/CVE-2021-40438 "
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-24-812"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-40438"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202109-1094"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-918",
        "trust": 1.1
      },
      {
        "problemtype": "Server-side request forgery (CWE-918) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-401786"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40438"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
      },
      {
        "trust": 2.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40438"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
      },
      {
        "trust": 1.7,
        "url": "https://www.tenable.com/security/tns-2021-17"
      },
      {
        "trust": 1.7,
        "url": "https://www.debian.org/security/2021/dsa-4982"
      },
      {
        "trust": 1.7,
        "url": "https://security.gentoo.org/glsa/202208-20"
      },
      {
        "trust": 1.7,
        "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
      },
      {
        "trust": 1.1,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-apache-httpd-2.4.49-vwl69swq"
      },
      {
        "trust": 1.1,
        "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
      },
      {
        "trust": 1.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-40438"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3cbugs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/spbr6wuybjnachke65spl7tjohx7rhwd/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/zncysr3bxt36fff4xtcpl3hdqk4vp45r/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 0.7,
        "url": "https://support.hpe.com/hpesc/public/docdisplay?docid=hpesbgn04586en_us\u0026doclocale=en_us"
      },
      {
        "trust": 0.7,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/spbr6wuybjnachke65spl7tjohx7rhwd/"
      },
      {
        "trust": 0.7,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/zncysr3bxt36fff4xtcpl3hdqk4vp45r/"
      },
      {
        "trust": 0.6,
        "url": "httpd.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3cbugs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3cusers."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3cusers."
      },
      {
        "trust": 0.6,
        "url": "httpd-2.4.49-vwl69swq"
      },
      {
        "trust": 0.6,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-apache-"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3cusers."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3cusers."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3cusers."
      },
      {
        "trust": 0.6,
        "url": "httpd.apache.org/security/vulnerabilities_24.html"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3cusers."
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164505/red-hat-security-advisory-2021-3836-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021101906"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3229"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021112904"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3524"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022041953"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6528442"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021111732"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3429"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164448/red-hat-security-advisory-2021-3746-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3373"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3357"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3250"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3591"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021102601"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/168072/gentoo-linux-security-advisory-202208-20.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021101116"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4004.7"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164318/ubuntu-security-notice-usn-5090-3.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6520016"
      },
      {
        "trust": 0.6,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-167-06"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.2978"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164460/red-hat-security-advisory-2021-3754-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4004.3"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4004.2"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4004.5"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6493841"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022042112"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022060811"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021092301"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3387"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3341"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021101922"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164329/ubuntu-security-notice-usn-5090-4.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3148"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164513/red-hat-security-advisory-2021-3856-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3366"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3784"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022011836"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021101340"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021091707"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/apache-http-server-four-vulnerabilities-36444"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3482"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021101005"
      },
      {
        "trust": 0.5,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.5,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33193"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-34798"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39275"
      },
      {
        "trust": 0.2,
        "url": "https://ubuntu.com/security/notices/usn-5090-1"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36160"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3cbugs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3cusers.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3856"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3816"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-26691"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-26691"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3836"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3746"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3745"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/apache2/2.4.29-1ubuntu4.17"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/apache2/2.4.41-4ubuntu3.5"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/apache2/2.4.46-4ubuntu1.2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/bugs/xxxxxx"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-5090-4"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-24-812"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-401786"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      },
      {
        "db": "PACKETSTORM",
        "id": "164513"
      },
      {
        "db": "PACKETSTORM",
        "id": "164493"
      },
      {
        "db": "PACKETSTORM",
        "id": "164505"
      },
      {
        "db": "PACKETSTORM",
        "id": "164448"
      },
      {
        "db": "PACKETSTORM",
        "id": "164443"
      },
      {
        "db": "PACKETSTORM",
        "id": "164305"
      },
      {
        "db": "PACKETSTORM",
        "id": "164329"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202109-1094"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40438"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-24-812"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-401786"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-40438"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      },
      {
        "db": "PACKETSTORM",
        "id": "164513"
      },
      {
        "db": "PACKETSTORM",
        "id": "164493"
      },
      {
        "db": "PACKETSTORM",
        "id": "164505"
      },
      {
        "db": "PACKETSTORM",
        "id": "164448"
      },
      {
        "db": "PACKETSTORM",
        "id": "164443"
      },
      {
        "db": "PACKETSTORM",
        "id": "164305"
      },
      {
        "db": "PACKETSTORM",
        "id": "164329"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202109-1094"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-40438"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-06-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-24-812"
      },
      {
        "date": "2022-01-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      },
      {
        "date": "2021-09-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-401786"
      },
      {
        "date": "2021-09-16T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-40438"
      },
      {
        "date": "2021-11-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      },
      {
        "date": "2021-10-14T15:26:45",
        "db": "PACKETSTORM",
        "id": "164513"
      },
      {
        "date": "2021-10-13T14:52:48",
        "db": "PACKETSTORM",
        "id": "164493"
      },
      {
        "date": "2021-10-13T15:23:01",
        "db": "PACKETSTORM",
        "id": "164505"
      },
      {
        "date": "2021-10-08T15:22:49",
        "db": "PACKETSTORM",
        "id": "164448"
      },
      {
        "date": "2021-10-08T15:12:22",
        "db": "PACKETSTORM",
        "id": "164443"
      },
      {
        "date": "2021-09-28T15:06:35",
        "db": "PACKETSTORM",
        "id": "164305"
      },
      {
        "date": "2021-09-29T14:50:01",
        "db": "PACKETSTORM",
        "id": "164329"
      },
      {
        "date": "2021-09-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202109-1094"
      },
      {
        "date": "2021-09-16T15:15:07.633000",
        "db": "NVD",
        "id": "CVE-2021-40438"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-08-15T00:00:00",
        "db": "ZDI",
        "id": "ZDI-24-812"
      },
      {
        "date": "2022-01-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2022-03224"
      },
      {
        "date": "2022-10-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-401786"
      },
      {
        "date": "2023-11-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-40438"
      },
      {
        "date": "2021-11-16T05:31:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      },
      {
        "date": "2022-08-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202109-1094"
      },
      {
        "date": "2024-11-21T06:24:06.787000",
        "db": "NVD",
        "id": "CVE-2021-40438"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "164305"
      },
      {
        "db": "PACKETSTORM",
        "id": "164329"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202109-1094"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apache\u00a0HTTP\u00a0Server\u00a0 Vulnerability in which a request is forwarded to a remote user\u0027s selected origin server in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004150"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "code problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202109-1094"
      }
    ],
    "trust": 0.6
  }
}
  suse-su-2021:3522-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for apache2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for apache2 fixes the following issues:\n\n- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)\n- CVE-2021-36160: Fixed an out-of-bounds read via a crafted request uri-path. (bsc#1190702)\n- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)\n- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-3522,SUSE-SLE-Module-Basesystem-15-SP2-2021-3522,SUSE-SLE-Module-Basesystem-15-SP3-2021-3522,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3522,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3522,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3522",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3522-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:3522-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213522-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:3522-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190666",
        "url": "https://bugzilla.suse.com/1190666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190669",
        "url": "https://bugzilla.suse.com/1190669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190702",
        "url": "https://bugzilla.suse.com/1190702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190703",
        "url": "https://bugzilla.suse.com/1190703"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34798 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-36160 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-36160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-39275 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-39275/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-40438 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-40438/"
      }
    ],
    "title": "Security update for apache2",
    "tracking": {
      "current_release_date": "2021-10-26T13:40:10Z",
      "generator": {
        "date": "2021-10-26T13:40:10Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:3522-1",
      "initial_release_date": "2021-10-26T13:40:10Z",
      "revision_history": [
        {
          "date": "2021-10-26T13:40:10Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-devel-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-devel-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-event-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-event-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-example-pages-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-example-pages-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-prefork-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-prefork-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-utils-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-utils-2.4.43-3.32.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-3.32.1.aarch64",
                "product": {
                  "name": "apache2-worker-2.4.43-3.32.1.aarch64",
                  "product_id": "apache2-worker-2.4.43-3.32.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-3.32.1.i586",
                "product": {
                  "name": "apache2-2.4.43-3.32.1.i586",
                  "product_id": "apache2-2.4.43-3.32.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-3.32.1.i586",
                "product": {
                  "name": "apache2-devel-2.4.43-3.32.1.i586",
                  "product_id": "apache2-devel-2.4.43-3.32.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-3.32.1.i586",
                "product": {
                  "name": "apache2-event-2.4.43-3.32.1.i586",
                  "product_id": "apache2-event-2.4.43-3.32.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-3.32.1.i586",
                "product": {
                  "name": "apache2-example-pages-2.4.43-3.32.1.i586",
                  "product_id": "apache2-example-pages-2.4.43-3.32.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-3.32.1.i586",
                "product": {
                  "name": "apache2-prefork-2.4.43-3.32.1.i586",
                  "product_id": "apache2-prefork-2.4.43-3.32.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-3.32.1.i586",
                "product": {
                  "name": "apache2-utils-2.4.43-3.32.1.i586",
                  "product_id": "apache2-utils-2.4.43-3.32.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-3.32.1.i586",
                "product": {
                  "name": "apache2-worker-2.4.43-3.32.1.i586",
                  "product_id": "apache2-worker-2.4.43-3.32.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-doc-2.4.43-3.32.1.noarch",
                "product": {
                  "name": "apache2-doc-2.4.43-3.32.1.noarch",
                  "product_id": "apache2-doc-2.4.43-3.32.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-devel-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-devel-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-event-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-event-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-example-pages-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-example-pages-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-prefork-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-prefork-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-utils-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-utils-2.4.43-3.32.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-3.32.1.ppc64le",
                "product": {
                  "name": "apache2-worker-2.4.43-3.32.1.ppc64le",
                  "product_id": "apache2-worker-2.4.43-3.32.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-devel-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-devel-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-event-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-event-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-example-pages-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-example-pages-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-prefork-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-prefork-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-utils-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-utils-2.4.43-3.32.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-3.32.1.s390x",
                "product": {
                  "name": "apache2-worker-2.4.43-3.32.1.s390x",
                  "product_id": "apache2-worker-2.4.43-3.32.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-devel-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-devel-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-event-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-event-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-example-pages-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-example-pages-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-prefork-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-prefork-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-utils-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-utils-2.4.43-3.32.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.43-3.32.1.x86_64",
                "product": {
                  "name": "apache2-worker-2.4.43-3.32.1.x86_64",
                  "product_id": "apache2-worker-2.4.43-3.32.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Package Hub 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Package Hub 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:packagehub:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Server Applications 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Server Applications 15 SP2",
                  "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Server Applications 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Server Applications 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-event-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-event-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-event-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-event-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-event-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-event-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-event-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-event-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.43-3.32.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.43-3.32.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.43-3.32.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.43-3.32.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.43-3.32.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.43-3.32.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-34798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34798",
          "url": "https://www.suse.com/security/cve/CVE-2021-34798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190669 for CVE-2021-34798",
          "url": "https://bugzilla.suse.com/1190669"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191297 for CVE-2021-34798",
          "url": "https://bugzilla.suse.com/1191297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-26T13:40:10Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-36160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-36160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-36160",
          "url": "https://www.suse.com/security/cve/CVE-2021-36160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190702 for CVE-2021-36160",
          "url": "https://bugzilla.suse.com/1190702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-26T13:40:10Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-36160"
    },
    {
      "cve": "CVE-2021-39275",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-39275"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-39275",
          "url": "https://www.suse.com/security/cve/CVE-2021-39275"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190666 for CVE-2021-39275",
          "url": "https://bugzilla.suse.com/1190666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-26T13:40:10Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-40438"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-40438",
          "url": "https://www.suse.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190703 for CVE-2021-40438",
          "url": "https://bugzilla.suse.com/1190703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP2:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP2:apache2-worker-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.43-3.32.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.43-3.32.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.43-3.32.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-26T13:40:10Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-40438"
    }
  ]
}
  suse-su-2021:3299-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for apache2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for apache2 fixes the following issues:\n\n- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)\n- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)\n- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "HPE-Helion-OpenStack-8-2021-3299,SUSE-2021-3299,SUSE-OpenStack-Cloud-8-2021-3299,SUSE-OpenStack-Cloud-9-2021-3299,SUSE-OpenStack-Cloud-Crowbar-8-2021-3299,SUSE-OpenStack-Cloud-Crowbar-9-2021-3299,SUSE-SLE-SAP-12-SP3-2021-3299,SUSE-SLE-SAP-12-SP4-2021-3299,SUSE-SLE-SDK-12-SP5-2021-3299,SUSE-SLE-SERVER-12-SP2-BCL-2021-3299,SUSE-SLE-SERVER-12-SP3-2021-3299,SUSE-SLE-SERVER-12-SP3-BCL-2021-3299,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3299,SUSE-SLE-SERVER-12-SP5-2021-3299",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3299-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:3299-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213299-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:3299-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190666",
        "url": "https://bugzilla.suse.com/1190666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190669",
        "url": "https://bugzilla.suse.com/1190669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190703",
        "url": "https://bugzilla.suse.com/1190703"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34798 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-39275 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-39275/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-40438 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-40438/"
      }
    ],
    "title": "Security update for apache2",
    "tracking": {
      "current_release_date": "2021-10-06T14:56:54Z",
      "generator": {
        "date": "2021-10-06T14:56:54Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:3299-1",
      "initial_release_date": "2021-10-06T14:56:54Z",
      "revision_history": [
        {
          "date": "2021-10-06T14:56:54Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.23-29.80.1.aarch64",
                "product": {
                  "name": "apache2-2.4.23-29.80.1.aarch64",
                  "product_id": "apache2-2.4.23-29.80.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.23-29.80.1.aarch64",
                "product": {
                  "name": "apache2-devel-2.4.23-29.80.1.aarch64",
                  "product_id": "apache2-devel-2.4.23-29.80.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.23-29.80.1.aarch64",
                "product": {
                  "name": "apache2-event-2.4.23-29.80.1.aarch64",
                  "product_id": "apache2-event-2.4.23-29.80.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.23-29.80.1.aarch64",
                "product": {
                  "name": "apache2-example-pages-2.4.23-29.80.1.aarch64",
                  "product_id": "apache2-example-pages-2.4.23-29.80.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.23-29.80.1.aarch64",
                "product": {
                  "name": "apache2-prefork-2.4.23-29.80.1.aarch64",
                  "product_id": "apache2-prefork-2.4.23-29.80.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.23-29.80.1.aarch64",
                "product": {
                  "name": "apache2-utils-2.4.23-29.80.1.aarch64",
                  "product_id": "apache2-utils-2.4.23-29.80.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.23-29.80.1.aarch64",
                "product": {
                  "name": "apache2-worker-2.4.23-29.80.1.aarch64",
                  "product_id": "apache2-worker-2.4.23-29.80.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.23-29.80.1.i586",
                "product": {
                  "name": "apache2-2.4.23-29.80.1.i586",
                  "product_id": "apache2-2.4.23-29.80.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.23-29.80.1.i586",
                "product": {
                  "name": "apache2-devel-2.4.23-29.80.1.i586",
                  "product_id": "apache2-devel-2.4.23-29.80.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.23-29.80.1.i586",
                "product": {
                  "name": "apache2-event-2.4.23-29.80.1.i586",
                  "product_id": "apache2-event-2.4.23-29.80.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.23-29.80.1.i586",
                "product": {
                  "name": "apache2-example-pages-2.4.23-29.80.1.i586",
                  "product_id": "apache2-example-pages-2.4.23-29.80.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.23-29.80.1.i586",
                "product": {
                  "name": "apache2-prefork-2.4.23-29.80.1.i586",
                  "product_id": "apache2-prefork-2.4.23-29.80.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.23-29.80.1.i586",
                "product": {
                  "name": "apache2-utils-2.4.23-29.80.1.i586",
                  "product_id": "apache2-utils-2.4.23-29.80.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.23-29.80.1.i586",
                "product": {
                  "name": "apache2-worker-2.4.23-29.80.1.i586",
                  "product_id": "apache2-worker-2.4.23-29.80.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-doc-2.4.23-29.80.1.noarch",
                "product": {
                  "name": "apache2-doc-2.4.23-29.80.1.noarch",
                  "product_id": "apache2-doc-2.4.23-29.80.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.23-29.80.1.ppc64le",
                "product": {
                  "name": "apache2-2.4.23-29.80.1.ppc64le",
                  "product_id": "apache2-2.4.23-29.80.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.23-29.80.1.ppc64le",
                "product": {
                  "name": "apache2-devel-2.4.23-29.80.1.ppc64le",
                  "product_id": "apache2-devel-2.4.23-29.80.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.23-29.80.1.ppc64le",
                "product": {
                  "name": "apache2-event-2.4.23-29.80.1.ppc64le",
                  "product_id": "apache2-event-2.4.23-29.80.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.23-29.80.1.ppc64le",
                "product": {
                  "name": "apache2-example-pages-2.4.23-29.80.1.ppc64le",
                  "product_id": "apache2-example-pages-2.4.23-29.80.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.23-29.80.1.ppc64le",
                "product": {
                  "name": "apache2-prefork-2.4.23-29.80.1.ppc64le",
                  "product_id": "apache2-prefork-2.4.23-29.80.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.23-29.80.1.ppc64le",
                "product": {
                  "name": "apache2-utils-2.4.23-29.80.1.ppc64le",
                  "product_id": "apache2-utils-2.4.23-29.80.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.23-29.80.1.ppc64le",
                "product": {
                  "name": "apache2-worker-2.4.23-29.80.1.ppc64le",
                  "product_id": "apache2-worker-2.4.23-29.80.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.23-29.80.1.s390",
                "product": {
                  "name": "apache2-2.4.23-29.80.1.s390",
                  "product_id": "apache2-2.4.23-29.80.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.23-29.80.1.s390",
                "product": {
                  "name": "apache2-devel-2.4.23-29.80.1.s390",
                  "product_id": "apache2-devel-2.4.23-29.80.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.23-29.80.1.s390",
                "product": {
                  "name": "apache2-event-2.4.23-29.80.1.s390",
                  "product_id": "apache2-event-2.4.23-29.80.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.23-29.80.1.s390",
                "product": {
                  "name": "apache2-example-pages-2.4.23-29.80.1.s390",
                  "product_id": "apache2-example-pages-2.4.23-29.80.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.23-29.80.1.s390",
                "product": {
                  "name": "apache2-prefork-2.4.23-29.80.1.s390",
                  "product_id": "apache2-prefork-2.4.23-29.80.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.23-29.80.1.s390",
                "product": {
                  "name": "apache2-utils-2.4.23-29.80.1.s390",
                  "product_id": "apache2-utils-2.4.23-29.80.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.23-29.80.1.s390",
                "product": {
                  "name": "apache2-worker-2.4.23-29.80.1.s390",
                  "product_id": "apache2-worker-2.4.23-29.80.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.23-29.80.1.s390x",
                "product": {
                  "name": "apache2-2.4.23-29.80.1.s390x",
                  "product_id": "apache2-2.4.23-29.80.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.23-29.80.1.s390x",
                "product": {
                  "name": "apache2-devel-2.4.23-29.80.1.s390x",
                  "product_id": "apache2-devel-2.4.23-29.80.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.23-29.80.1.s390x",
                "product": {
                  "name": "apache2-event-2.4.23-29.80.1.s390x",
                  "product_id": "apache2-event-2.4.23-29.80.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.23-29.80.1.s390x",
                "product": {
                  "name": "apache2-example-pages-2.4.23-29.80.1.s390x",
                  "product_id": "apache2-example-pages-2.4.23-29.80.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.23-29.80.1.s390x",
                "product": {
                  "name": "apache2-prefork-2.4.23-29.80.1.s390x",
                  "product_id": "apache2-prefork-2.4.23-29.80.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.23-29.80.1.s390x",
                "product": {
                  "name": "apache2-utils-2.4.23-29.80.1.s390x",
                  "product_id": "apache2-utils-2.4.23-29.80.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.23-29.80.1.s390x",
                "product": {
                  "name": "apache2-worker-2.4.23-29.80.1.s390x",
                  "product_id": "apache2-worker-2.4.23-29.80.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.23-29.80.1.x86_64",
                "product": {
                  "name": "apache2-2.4.23-29.80.1.x86_64",
                  "product_id": "apache2-2.4.23-29.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.23-29.80.1.x86_64",
                "product": {
                  "name": "apache2-example-pages-2.4.23-29.80.1.x86_64",
                  "product_id": "apache2-example-pages-2.4.23-29.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.23-29.80.1.x86_64",
                "product": {
                  "name": "apache2-prefork-2.4.23-29.80.1.x86_64",
                  "product_id": "apache2-prefork-2.4.23-29.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.23-29.80.1.x86_64",
                "product": {
                  "name": "apache2-utils-2.4.23-29.80.1.x86_64",
                  "product_id": "apache2-utils-2.4.23-29.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.23-29.80.1.x86_64",
                "product": {
                  "name": "apache2-worker-2.4.23-29.80.1.x86_64",
                  "product_id": "apache2-worker-2.4.23-29.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.23-29.80.1.x86_64",
                "product": {
                  "name": "apache2-devel-2.4.23-29.80.1.x86_64",
                  "product_id": "apache2-devel-2.4.23-29.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.23-29.80.1.x86_64",
                "product": {
                  "name": "apache2-event-2.4.23-29.80.1.x86_64",
                  "product_id": "apache2-event-2.4.23-29.80.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "HPE Helion OpenStack 8",
                "product": {
                  "name": "HPE Helion OpenStack 8",
                  "product_id": "HPE Helion OpenStack 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:hpe-helion-openstack:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 8",
                "product": {
                  "name": "SUSE OpenStack Cloud 8",
                  "product_id": "SUSE OpenStack Cloud 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 9",
                "product": {
                  "name": "SUSE OpenStack Cloud 9",
                  "product_id": "SUSE OpenStack Cloud 9",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud:9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud Crowbar 8",
                "product": {
                  "name": "SUSE OpenStack Cloud Crowbar 8",
                  "product_id": "SUSE OpenStack Cloud Crowbar 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud Crowbar 9",
                "product": {
                  "name": "SUSE OpenStack Cloud Crowbar 9",
                  "product_id": "SUSE OpenStack Cloud Crowbar 9",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP2-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP2-BCL",
                  "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-bcl:12:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3-BCL",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-bcl:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-devel-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-devel-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.23-29.80.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.80.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-34798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:apache2-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.80.1.noarch",
          "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34798",
          "url": "https://www.suse.com/security/cve/CVE-2021-34798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190669 for CVE-2021-34798",
          "url": "https://bugzilla.suse.com/1190669"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191297 for CVE-2021-34798",
          "url": "https://bugzilla.suse.com/1191297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:apache2-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.80.1.noarch",
            "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:apache2-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.80.1.noarch",
            "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-06T14:56:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-39275",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-39275"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:apache2-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.80.1.noarch",
          "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-39275",
          "url": "https://www.suse.com/security/cve/CVE-2021-39275"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190666 for CVE-2021-39275",
          "url": "https://bugzilla.suse.com/1190666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:apache2-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.80.1.noarch",
            "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:apache2-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.80.1.noarch",
            "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-06T14:56:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-40438"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:apache2-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.80.1.noarch",
          "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.80.1.x86_64",
          "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.80.1.noarch",
          "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.80.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-40438",
          "url": "https://www.suse.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190703 for CVE-2021-40438",
          "url": "https://bugzilla.suse.com/1190703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:apache2-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.80.1.noarch",
            "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:apache2-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.80.1.noarch",
            "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.80.1.noarch",
            "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.80.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-06T14:56:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-40438"
    }
  ]
}
  suse-su-2021:3335-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for apache2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for apache2 fixes the following issues:\n\n- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)\n- CVE-2021-36160: Fixed an out-of-bounds read via a crafted request uri-path. (bsc#1190702)\n- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)\n- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)\n- CVE-2021-33193: Fixed request splitting via HTTP/2 method injection and mod_proxy. (bsc#1189387)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-3335,SUSE-SLE-Product-HPC-15-2021-3335,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3335,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3335,SUSE-SLE-Product-SLES-15-2021-3335,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3335,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3335,SUSE-SLE-Product-SLES_SAP-15-2021-3335,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3335,SUSE-Storage-6-2021-3335",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3335-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:3335-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213335-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:3335-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189387",
        "url": "https://bugzilla.suse.com/1189387"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190666",
        "url": "https://bugzilla.suse.com/1190666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190669",
        "url": "https://bugzilla.suse.com/1190669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190702",
        "url": "https://bugzilla.suse.com/1190702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190703",
        "url": "https://bugzilla.suse.com/1190703"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33193 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33193/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34798 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-36160 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-36160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-39275 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-39275/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-40438 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-40438/"
      }
    ],
    "title": "Security update for apache2",
    "tracking": {
      "current_release_date": "2021-10-12T06:19:02Z",
      "generator": {
        "date": "2021-10-12T06:19:02Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:3335-1",
      "initial_release_date": "2021-10-12T06:19:02Z",
      "revision_history": [
        {
          "date": "2021-10-12T06:19:02Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.33-3.55.1.aarch64",
                "product": {
                  "name": "apache2-2.4.33-3.55.1.aarch64",
                  "product_id": "apache2-2.4.33-3.55.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.33-3.55.1.aarch64",
                "product": {
                  "name": "apache2-devel-2.4.33-3.55.1.aarch64",
                  "product_id": "apache2-devel-2.4.33-3.55.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.33-3.55.1.aarch64",
                "product": {
                  "name": "apache2-event-2.4.33-3.55.1.aarch64",
                  "product_id": "apache2-event-2.4.33-3.55.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.33-3.55.1.aarch64",
                "product": {
                  "name": "apache2-example-pages-2.4.33-3.55.1.aarch64",
                  "product_id": "apache2-example-pages-2.4.33-3.55.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.33-3.55.1.aarch64",
                "product": {
                  "name": "apache2-prefork-2.4.33-3.55.1.aarch64",
                  "product_id": "apache2-prefork-2.4.33-3.55.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.33-3.55.1.aarch64",
                "product": {
                  "name": "apache2-utils-2.4.33-3.55.1.aarch64",
                  "product_id": "apache2-utils-2.4.33-3.55.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.33-3.55.1.aarch64",
                "product": {
                  "name": "apache2-worker-2.4.33-3.55.1.aarch64",
                  "product_id": "apache2-worker-2.4.33-3.55.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.33-3.55.1.i586",
                "product": {
                  "name": "apache2-2.4.33-3.55.1.i586",
                  "product_id": "apache2-2.4.33-3.55.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.33-3.55.1.i586",
                "product": {
                  "name": "apache2-devel-2.4.33-3.55.1.i586",
                  "product_id": "apache2-devel-2.4.33-3.55.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.33-3.55.1.i586",
                "product": {
                  "name": "apache2-event-2.4.33-3.55.1.i586",
                  "product_id": "apache2-event-2.4.33-3.55.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.33-3.55.1.i586",
                "product": {
                  "name": "apache2-example-pages-2.4.33-3.55.1.i586",
                  "product_id": "apache2-example-pages-2.4.33-3.55.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.33-3.55.1.i586",
                "product": {
                  "name": "apache2-prefork-2.4.33-3.55.1.i586",
                  "product_id": "apache2-prefork-2.4.33-3.55.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.33-3.55.1.i586",
                "product": {
                  "name": "apache2-utils-2.4.33-3.55.1.i586",
                  "product_id": "apache2-utils-2.4.33-3.55.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.33-3.55.1.i586",
                "product": {
                  "name": "apache2-worker-2.4.33-3.55.1.i586",
                  "product_id": "apache2-worker-2.4.33-3.55.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-doc-2.4.33-3.55.1.noarch",
                "product": {
                  "name": "apache2-doc-2.4.33-3.55.1.noarch",
                  "product_id": "apache2-doc-2.4.33-3.55.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.33-3.55.1.ppc64le",
                "product": {
                  "name": "apache2-2.4.33-3.55.1.ppc64le",
                  "product_id": "apache2-2.4.33-3.55.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.33-3.55.1.ppc64le",
                "product": {
                  "name": "apache2-devel-2.4.33-3.55.1.ppc64le",
                  "product_id": "apache2-devel-2.4.33-3.55.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.33-3.55.1.ppc64le",
                "product": {
                  "name": "apache2-event-2.4.33-3.55.1.ppc64le",
                  "product_id": "apache2-event-2.4.33-3.55.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.33-3.55.1.ppc64le",
                "product": {
                  "name": "apache2-example-pages-2.4.33-3.55.1.ppc64le",
                  "product_id": "apache2-example-pages-2.4.33-3.55.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.33-3.55.1.ppc64le",
                "product": {
                  "name": "apache2-prefork-2.4.33-3.55.1.ppc64le",
                  "product_id": "apache2-prefork-2.4.33-3.55.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.33-3.55.1.ppc64le",
                "product": {
                  "name": "apache2-utils-2.4.33-3.55.1.ppc64le",
                  "product_id": "apache2-utils-2.4.33-3.55.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.33-3.55.1.ppc64le",
                "product": {
                  "name": "apache2-worker-2.4.33-3.55.1.ppc64le",
                  "product_id": "apache2-worker-2.4.33-3.55.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.33-3.55.1.s390x",
                "product": {
                  "name": "apache2-2.4.33-3.55.1.s390x",
                  "product_id": "apache2-2.4.33-3.55.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.33-3.55.1.s390x",
                "product": {
                  "name": "apache2-devel-2.4.33-3.55.1.s390x",
                  "product_id": "apache2-devel-2.4.33-3.55.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.33-3.55.1.s390x",
                "product": {
                  "name": "apache2-event-2.4.33-3.55.1.s390x",
                  "product_id": "apache2-event-2.4.33-3.55.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.33-3.55.1.s390x",
                "product": {
                  "name": "apache2-example-pages-2.4.33-3.55.1.s390x",
                  "product_id": "apache2-example-pages-2.4.33-3.55.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.33-3.55.1.s390x",
                "product": {
                  "name": "apache2-prefork-2.4.33-3.55.1.s390x",
                  "product_id": "apache2-prefork-2.4.33-3.55.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.33-3.55.1.s390x",
                "product": {
                  "name": "apache2-utils-2.4.33-3.55.1.s390x",
                  "product_id": "apache2-utils-2.4.33-3.55.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.33-3.55.1.s390x",
                "product": {
                  "name": "apache2-worker-2.4.33-3.55.1.s390x",
                  "product_id": "apache2-worker-2.4.33-3.55.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.33-3.55.1.x86_64",
                "product": {
                  "name": "apache2-2.4.33-3.55.1.x86_64",
                  "product_id": "apache2-2.4.33-3.55.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.33-3.55.1.x86_64",
                "product": {
                  "name": "apache2-devel-2.4.33-3.55.1.x86_64",
                  "product_id": "apache2-devel-2.4.33-3.55.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-event-2.4.33-3.55.1.x86_64",
                "product": {
                  "name": "apache2-event-2.4.33-3.55.1.x86_64",
                  "product_id": "apache2-event-2.4.33-3.55.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.33-3.55.1.x86_64",
                "product": {
                  "name": "apache2-example-pages-2.4.33-3.55.1.x86_64",
                  "product_id": "apache2-example-pages-2.4.33-3.55.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.33-3.55.1.x86_64",
                "product": {
                  "name": "apache2-prefork-2.4.33-3.55.1.x86_64",
                  "product_id": "apache2-prefork-2.4.33-3.55.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.33-3.55.1.x86_64",
                "product": {
                  "name": "apache2-utils-2.4.33-3.55.1.x86_64",
                  "product_id": "apache2-utils-2.4.33-3.55.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.33-3.55.1.x86_64",
                "product": {
                  "name": "apache2-worker-2.4.33-3.55.1.x86_64",
                  "product_id": "apache2-worker-2.4.33-3.55.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP1-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP1-BCL",
                  "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_bcl:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 6",
                "product": {
                  "name": "SUSE Enterprise Storage 6",
                  "product_id": "SUSE Enterprise Storage 6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.33-3.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.33-3.55.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.33-3.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.33-3.55.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.33-3.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.33-3.55.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.33-3.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.33-3.55.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x"
        },
        "product_reference": "apache2-2.4.33-3.55.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.33-3.55.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.33-3.55.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.33-3.55.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.33-3.55.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x"
        },
        "product_reference": "apache2-2.4.33-3.55.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.33-3.55.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.33-3.55.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.33-3.55.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.33-3.55.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.33-3.55.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.33-3.55.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.33-3.55.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.33-3.55.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-devel-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.33-3.55.1.noarch as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.33-3.55.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.33-3.55.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.33-3.55.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.33-3.55.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.33-3.55.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-33193",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33193"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33193",
          "url": "https://www.suse.com/security/cve/CVE-2021-33193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189387 for CVE-2021-33193",
          "url": "https://bugzilla.suse.com/1189387"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195686 for CVE-2021-33193",
          "url": "https://bugzilla.suse.com/1195686"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-12T06:19:02Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2021-33193"
    },
    {
      "cve": "CVE-2021-34798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34798",
          "url": "https://www.suse.com/security/cve/CVE-2021-34798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190669 for CVE-2021-34798",
          "url": "https://bugzilla.suse.com/1190669"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191297 for CVE-2021-34798",
          "url": "https://bugzilla.suse.com/1191297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-12T06:19:02Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-36160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-36160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-36160",
          "url": "https://www.suse.com/security/cve/CVE-2021-36160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190702 for CVE-2021-36160",
          "url": "https://bugzilla.suse.com/1190702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-12T06:19:02Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-36160"
    },
    {
      "cve": "CVE-2021-39275",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-39275"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-39275",
          "url": "https://www.suse.com/security/cve/CVE-2021-39275"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190666 for CVE-2021-39275",
          "url": "https://bugzilla.suse.com/1190666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-12T06:19:02Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-40438"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-40438",
          "url": "https://www.suse.com/security/cve/CVE-2021-40438"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190703 for CVE-2021-40438",
          "url": "https://bugzilla.suse.com/1190703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Enterprise Storage 6:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-3.55.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-3.55.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-3.55.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-10-12T06:19:02Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-40438"
    }
  ]
}
  cnvd-2022-03224
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://access.redhat.com/security/cve/cve-2021-40438
| Name | Apache HTTP Server <=2.4.48 | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2021-40438",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
    }
  },
  "description": "Apache HTTP Server\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90\u7f51\u9875\u670d\u52a1\u5668\u3002\u8be5\u670d\u52a1\u5668\u5177\u6709\u5feb\u901f\u3001\u53ef\u9760\u4e14\u53ef\u901a\u8fc7\u7b80\u5355\u7684API\u8fdb\u884c\u6269\u5145\u7684\u7279\u70b9\u3002\n\nApache HTTP Server\u57282.4.48\u53ca\u4e4b\u524d\u7248\u672c\u5b58\u5728\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8emod_proxy\u6a21\u5757\u672a\u80fd\u6b63\u786e\u9a8c\u8bc1\u7528\u6237\u8f93\u5165\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u8bf7\u6c42\u8f6c\u53d1\u5230\u8fdc\u7a0b\u7528\u6237\u9009\u62e9\u7684\u6e90\u670d\u52a1\u5668\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://access.redhat.com/security/cve/cve-2021-40438",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-03224",
  "openTime": "2022-01-13",
  "patchDescription": "Apache HTTP Server\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90\u7f51\u9875\u670d\u52a1\u5668\u3002\u8be5\u670d\u52a1\u5668\u5177\u6709\u5feb\u901f\u3001\u53ef\u9760\u4e14\u53ef\u901a\u8fc7\u7b80\u5355\u7684API\u8fdb\u884c\u6269\u5145\u7684\u7279\u70b9\u3002\r\n\r\nApache HTTP Server\u57282.4.48\u53ca\u4e4b\u524d\u7248\u672c\u5b58\u5728\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8emod_proxy\u6a21\u5757\u672a\u80fd\u6b63\u786e\u9a8c\u8bc1\u7528\u6237\u8f93\u5165\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u8bf7\u6c42\u8f6c\u53d1\u5230\u8fdc\u7a0b\u7528\u6237\u9009\u62e9\u7684\u6e90\u670d\u52a1\u5668\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Apache HTTP Server mod_proxy\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Apache HTTP Server \u003c=2.4.48"
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
  "serverity": "\u4e2d",
  "submitTime": "2021-09-18",
  "title": "Apache HTTP Server mod_proxy\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e"
}
  fkie_cve-2021-40438
Vulnerability from fkie_nvd
9.0 (Critical) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| security@apache.org | https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf | Third Party Advisory | |
| security@apache.org | https://httpd.apache.org/security/vulnerabilities_24.html | Release Notes, Vendor Advisory | |
| security@apache.org | https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| security@apache.org | https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E | Mailing List | |
| security@apache.org | https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| security@apache.org | https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| security@apache.org | https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| security@apache.org | https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| security@apache.org | https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| security@apache.org | https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html | Mailing List, Third Party Advisory | |
| security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ | Release Notes | |
| security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ | Release Notes | |
| security@apache.org | https://security.gentoo.org/glsa/202208-20 | Third Party Advisory | |
| security@apache.org | https://security.netapp.com/advisory/ntap-20211008-0004/ | Third Party Advisory | |
| security@apache.org | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ | Broken Link, Third Party Advisory | |
| security@apache.org | https://www.debian.org/security/2021/dsa-4982 | Mailing List, Third Party Advisory | |
| security@apache.org | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
| security@apache.org | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
| security@apache.org | https://www.tenable.com/security/tns-2021-17 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://httpd.apache.org/security/vulnerabilities_24.html | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ | Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ | Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202208-20 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20211008-0004/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4982 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2021-17 | Third Party Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40438 | US Government Resource | 
| Vendor | Product | Version | |
|---|---|---|---|
| resf | rocky_linux | 8.0 | |
| redhat | jboss_core_services | 1.0 | |
| redhat | enterprise_linux | 7.0 | |
| redhat | enterprise_linux | 8.0 | |
| redhat | software_collections | 1.0 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_server_workstation | 7.0 | |
| redhat | enterprise_linux | 8.0 | |
| redhat | enterprise_linux_eus | 8.1 | |
| redhat | enterprise_linux_eus | 8.2 | |
| redhat | enterprise_linux_eus | 8.4 | |
| redhat | enterprise_linux_eus | 8.6 | |
| redhat | enterprise_linux_eus | 8.8 | |
| redhat | enterprise_linux_for_arm_64 | 8.0 | |
| redhat | enterprise_linux_for_arm_64_eus | 8.6 | |
| redhat | enterprise_linux_for_arm_64_eus | 8.8 | |
| redhat | enterprise_linux_for_ibm_z_systems | 7.0_s390x | |
| redhat | enterprise_linux_for_ibm_z_systems | 8.0 | |
| redhat | enterprise_linux_for_ibm_z_systems_eus | 8.1 | |
| redhat | enterprise_linux_for_ibm_z_systems_eus | 8.4 | |
| redhat | enterprise_linux_for_ibm_z_systems_eus | 8.8 | |
| redhat | enterprise_linux_for_ibm_z_systems_eus_s390x | 8.2 | |
| redhat | enterprise_linux_for_power_big_endian | 7.0 | |
| redhat | enterprise_linux_for_power_little_endian | 7.0 | |
| redhat | enterprise_linux_for_power_little_endian | 8.0 | |
| redhat | enterprise_linux_for_power_little_endian_eus | 8.1 | |
| redhat | enterprise_linux_for_power_little_endian_eus | 8.2 | |
| redhat | enterprise_linux_for_power_little_endian_eus | 8.4 | |
| redhat | enterprise_linux_for_power_little_endian_eus | 8.6 | |
| redhat | enterprise_linux_for_power_little_endian_eus | 8.8 | |
| redhat | enterprise_linux_for_scientific_computing | 7.0 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_server_aus | 7.2 | |
| redhat | enterprise_linux_server_aus | 7.3 | |
| redhat | enterprise_linux_server_aus | 7.4 | |
| redhat | enterprise_linux_server_aus | 7.6 | |
| redhat | enterprise_linux_server_aus | 7.7 | |
| redhat | enterprise_linux_server_aus | 8.2 | |
| redhat | enterprise_linux_server_aus | 8.4 | |
| redhat | enterprise_linux_server_aus | 8.6 | |
| redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 7.6 | |
| redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 7.7 | |
| redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.1 | |
| redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.2 | |
| redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.4 | |
| redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.6 | |
| redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.8 | |
| redhat | enterprise_linux_server_tus | 7.6 | |
| redhat | enterprise_linux_server_tus | 7.7 | |
| redhat | enterprise_linux_server_tus | 8.2 | |
| redhat | enterprise_linux_server_tus | 8.4 | |
| redhat | enterprise_linux_server_tus | 8.6 | |
| redhat | enterprise_linux_server_tus | 8.8 | |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.6 | |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.7 | |
| redhat | enterprise_linux_update_services_for_sap_solutions | 8.1 | |
| redhat | enterprise_linux_update_services_for_sap_solutions | 8.2 | |
| redhat | enterprise_linux_update_services_for_sap_solutions | 8.4 | |
| redhat | enterprise_linux_update_services_for_sap_solutions | 8.6 | |
| redhat | enterprise_linux_update_services_for_sap_solutions | 8.8 | |
| redhat | enterprise_linux_workstation | 7.0 | |
| apache | http_server | * | |
| fedoraproject | fedora | 34 | |
| fedoraproject | fedora | 35 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 | |
| debian | debian_linux | 11.0 | |
| netapp | cloud_backup | - | |
| netapp | clustered_data_ontap | - | |
| netapp | storagegrid | - | |
| broadcom | brocade_fabric_operating_system_firmware | - | |
| f5 | f5os | * | |
| f5 | f5os | * | |
| oracle | enterprise_manager_ops_center | 12.4.0.0 | |
| oracle | http_server | 12.2.1.3.0 | |
| oracle | http_server | 12.2.1.4.0 | |
| oracle | instantis_enterprisetrack | 17.1 | |
| oracle | instantis_enterprisetrack | 17.2 | |
| oracle | instantis_enterprisetrack | 17.3 | |
| oracle | secure_global_desktop | 5.6 | |
| oracle | zfs_storage_appliance_kit | 8.8 | |
| siemens | ruggedcom_nms | * | |
| siemens | sinec_nms | * | |
| siemens | sinema_remote_connect_server | * | |
| siemens | sinema_remote_connect_server | 3.2 | |
| siemens | sinema_server | 14.0 | |
| tenable | tenable.sc | * | 
{
  "cisaActionDue": "2021-12-15",
  "cisaExploitAdd": "2021-12-01",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Apache HTTP Server-Side Request Forgery (SSRF)",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:resf:rocky_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "55B10764-9920-49E3-B816-FCA37E546DF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2466282-51AB-478D-9FF4-FA524265ED2E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D7EE4B6-A6EC-4B9B-91DF-79615796673F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC7808D1-B267-4361-8187-5AB70B64179A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "92BC9265-6959-4D37-BE5E-8C45E98992F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "831F0F47-3565-4763-B16F-C87B1FF2035E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E3F09B5-569F-4C58-9FCA-3C0953D107B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F797F2E-00E6-4D03-A94E-524227529A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFBEEE7-8BC5-4F4E-8EFA-42A6743152BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "83981111-E13A-4A88-80FD-F63D7CCAA47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "2148300C-ECBD-4ED5-A164-79629859DD43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C21FE1-EA5C-498F-9C6C-D05F91A88217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "280D547B-F204-4848-9262-A103176B740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9BD9AE-46FC-4609-8D99-A3CFE91D58D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "83364F5C-57F4-4D57-B54F-540CAC1D7753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "725566B6-4319-489E-9A69-9E36ED2950DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "47811209-5CE5-4375-8391-B0A7F6A0E420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EB6F417-25D0-4A28-B7BA-D21929EAA9E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C80DB2-4A78-4EC9-B2A8-1E4D902C4834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "983533DD-3970-4A37-9A9C-582BD48AA1E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "729C515E-1DD3-466D-A50B-AFE058FFC94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A49ABD84-6755-4894-AD4E-49AAD39933C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "37CE1DC7-72C5-483C-8921-0B462C8284D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24D94-834A-4E9D-8F73-624AFA99AAA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "57B5CF5A-D48E-4AD0-91E2-F5BDD44B7A66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F33DBA-25BA-4A29-A80C-A9FB96FFE721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF2B9A2-8CA6-4EDF-9975-07265E363ED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DA6A5AF-2EBE-4ED9-B312-DCD9D150D031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22D095ED-9247-4133-A133-73B7668565E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "871A5C26-DB7B-4870-A5B2-5DD24C90B4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A809B2-2771-4780-9E0D-6A7B4A534CFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09ACF2D-D83F-4A86-8185-9569605D8EE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC10D919-57FD-4725-B8D2-39ECB476902F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1272DF03-7674-4BD4-8E64-94004B195448",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1CA946D-1665-4874-9D41-C7D963DD1F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C450C83-695F-4408-8B4F-0E7D6DDAE345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3707B08D-8A78-48CB-914C-33A753D13FC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADDB02D-F377-43CE-B0A8-FC6C7D5CFABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D3CC6E-3A8F-4694-B3CC-0DB12A3E9A0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E881C927-DF96-4D2E-9887-FF12E456B1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB096D5D-E8F6-4164-8B76-0217B7151D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "01ED4F33-EBE7-4C04-8312-3DA580EFFB68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1691C7CE-5CDA-4B9A-854E-3B58C1115526",
              "versionEndIncluding": "2.4.48",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADFF451-740F-4DBA-BD23-3881945D3E40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2748912-FC54-47F6-8C0C-B96784765B8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:f5os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "80A2EFAB-4D06-4254-B2FE-5D1F84BDFD3A",
              "versionEndIncluding": "1.1.4",
              "versionStartIncluding": "1.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:f5os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBACFB6F-D57E-4ECA-81BB-9388E64F7DF3",
              "versionEndIncluding": "1.2.1",
              "versionStartIncluding": "1.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B095CC03-7077-4A58-AB25-CC5380CDCE5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFC79B17-E9D2-44D5-93ED-2F959E7A3D43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD04BEE5-E9A8-4584-A68C-0195CE9C402C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82EA4BA7-C38B-4AF3-8914-9E3D089EBDD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9C9BC66-FA5F-4774-9BDA-7AB88E2839C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F69B9A5-F21B-4904-9F27-95C0F7A628E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DA11710-9EA8-49B4-8FD1-3AEE442F6ADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:siemens:ruggedcom_nms:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "414A7F48-EFA5-4D86-9F8D-5A179A6CFC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF5E6CF-BBA5-4CCF-ACB1-BEF8D2C372B8",
              "versionEndExcluding": "1.0.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC9C9A-FE14-4D50-A8EC-C309229356C8",
              "versionEndExcluding": "3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D889831F-64D0-428A-A26C-71152C3B9974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "B0A5CC25-A323-4D49-8989-5A417D12D646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A686FAF0-1383-4BBB-B7F5-CBCCAB55B356",
              "versionEndIncluding": "5.19.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier."
    },
    {
      "lang": "es",
      "value": "Un uri-path dise\u00f1ado puede causar que mod_proxy reenv\u00ede la petici\u00f3n a un servidor de origen elegido por el usuario remoto. Este problema afecta a Apache HTTP Server versiones 2.4.48 y anteriores"
    }
  ],
  "id": "CVE-2021-40438",
  "lastModified": "2025-10-27T17:37:06.747",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 6.0,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2021-09-16T15:15:07.633",
  "references": [
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202208-20"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2021/dsa-4982"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/security/tns-2021-17"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202208-20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2021/dsa-4982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/security/tns-2021-17"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "tags": [
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40438"
    }
  ],
  "sourceIdentifier": "security@apache.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-918"
        }
      ],
      "source": "security@apache.org",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-918"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  ghsa-rwxq-58vm-3v2j
Vulnerability from github
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
{
  "affected": [],
  "aliases": [
    "CVE-2021-40438"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-918"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2021-09-16T15:15:00Z",
    "severity": "CRITICAL"
  },
  "details": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
  "id": "GHSA-rwxq-58vm-3v2j",
  "modified": "2025-10-22T00:32:21Z",
  "published": "2022-05-24T19:14:50Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438"
    },
    {
      "type": "WEB",
      "url": "https://www.tenable.com/security/tns-2021-17"
    },
    {
      "type": "WEB",
      "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
    },
    {
      "type": "WEB",
      "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
    },
    {
      "type": "WEB",
      "url": "https://www.debian.org/security/2021/dsa-4982"
    },
    {
      "type": "WEB",
      "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40438"
    },
    {
      "type": "WEB",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20211008-0004"
    },
    {
      "type": "WEB",
      "url": "https://security.gentoo.org/glsa/202208-20"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
    },
    {
      "type": "WEB",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  gsd-2021-40438
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2021-40438",
    "description": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
    "id": "GSD-2021-40438",
    "references": [
      "https://www.suse.com/security/cve/CVE-2021-40438.html",
      "https://www.debian.org/security/2021/dsa-4982",
      "https://access.redhat.com/errata/RHSA-2021:3856",
      "https://access.redhat.com/errata/RHSA-2021:3837",
      "https://access.redhat.com/errata/RHSA-2021:3836",
      "https://access.redhat.com/errata/RHSA-2021:3816",
      "https://access.redhat.com/errata/RHSA-2021:3754",
      "https://access.redhat.com/errata/RHSA-2021:3746",
      "https://access.redhat.com/errata/RHSA-2021:3745",
      "https://ubuntu.com/security/CVE-2021-40438",
      "https://advisories.mageia.org/CVE-2021-40438.html",
      "https://security.archlinux.org/CVE-2021-40438",
      "https://alas.aws.amazon.com/cve/html/CVE-2021-40438.html",
      "https://linux.oracle.com/cve/CVE-2021-40438.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2021-40438"
      ],
      "details": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
      "id": "GSD-2021-40438",
      "modified": "2023-12-13T01:23:25.140751Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cisa.gov": {
      "cveID": "CVE-2021-40438",
      "dateAdded": "2021-12-01",
      "dueDate": "2021-12-15",
      "product": "Apache",
      "requiredAction": "Apply updates per vendor instructions.",
      "shortDescription": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
      "vendorProject": "Apache",
      "vulnerabilityName": "Apache HTTP Server-Side Request Forgery (SSRF)"
    },
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security@apache.org",
        "ID": "CVE-2021-40438",
        "STATE": "PUBLIC",
        "TITLE": "mod_proxy SSRF"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Apache HTTP Server",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "\u003c=",
                          "version_name": "Apache HTTP Server 2.4",
                          "version_value": "2.4.48"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Apache Software Foundation"
            }
          ]
        }
      },
      "credit": [
        {
          "lang": "eng",
          "value": "The issue was discovered by the Apache HTTP security team while analysing CVE-2021-36160"
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier."
          }
        ]
      },
      "generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "impact": [
        {
          "other": "high"
        }
      ],
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "CWE-918 Server Side Request Forgery (SSRF)"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://httpd.apache.org/security/vulnerabilities_24.html",
            "refsource": "MISC",
            "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
          },
          {
            "name": "FEDORA-2021-dce7e7738e",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/"
          },
          {
            "name": "[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "FEDORA-2021-e3f6dd670d",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/"
          },
          {
            "name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update",
            "refsource": "MLIST",
            "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
          },
          {
            "name": "[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E"
          },
          {
            "name": "DSA-4982",
            "refsource": "DEBIAN",
            "url": "https://www.debian.org/security/2021/dsa-4982"
          },
          {
            "name": "[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E"
          },
          {
            "name": "20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021",
            "refsource": "CISCO",
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
          },
          {
            "name": "https://www.oracle.com/security-alerts/cpujan2022.html",
            "refsource": "MISC",
            "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
          },
          {
            "name": "https://www.tenable.com/security/tns-2021-17",
            "refsource": "CONFIRM",
            "url": "https://www.tenable.com/security/tns-2021-17"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
            "refsource": "CONFIRM",
            "url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
          },
          {
            "name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
            "refsource": "MISC",
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          {
            "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
            "refsource": "CONFIRM",
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
          },
          {
            "name": "GLSA-202208-20",
            "refsource": "GENTOO",
            "url": "https://security.gentoo.org/glsa/202208-20"
          }
        ]
      },
      "source": {
        "discovery": "UNKNOWN"
      },
      "timeline": [
        {
          "lang": "eng",
          "time": "2021-09-16",
          "value": "2.4.49 released"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.4.48",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:f5:f5os:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.1.4",
                "versionStartIncluding": "1.1.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:f5:f5os:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.2.1",
                "versionStartIncluding": "1.2.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "security@apache.org",
          "ID": "CVE-2021-40438"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-918"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://httpd.apache.org/security/vulnerabilities_24.html",
              "refsource": "MISC",
              "tags": [
                "Release Notes",
                "Vendor Advisory"
              ],
              "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
            },
            {
              "name": "FEDORA-2021-dce7e7738e",
              "refsource": "FEDORA",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/"
            },
            {
              "name": "[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Vendor Advisory"
              ],
              "url": "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Vendor Advisory"
              ],
              "url": "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Vendor Advisory"
              ],
              "url": "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Vendor Advisory"
              ],
              "url": "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "FEDORA-2021-e3f6dd670d",
              "refsource": "FEDORA",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/"
            },
            {
              "name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
            },
            {
              "name": "[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Vendor Advisory"
              ],
              "url": "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E"
            },
            {
              "name": "DSA-4982",
              "refsource": "DEBIAN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.debian.org/security/2021/dsa-4982"
            },
            {
              "name": "[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Vendor Advisory"
              ],
              "url": "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Vendor Advisory"
              ],
              "url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E"
            },
            {
              "name": "https://www.tenable.com/security/tns-2021-17",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.tenable.com/security/tns-2021-17"
            },
            {
              "name": "20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021",
              "refsource": "CISCO",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
            },
            {
              "name": "https://www.oracle.com/security-alerts/cpujan2022.html",
              "refsource": "MISC",
              "tags": [
                "Patch",
                "Third Party Advisory"
              ],
              "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
            },
            {
              "name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
              "refsource": "MISC",
              "tags": [
                "Patch",
                "Third Party Advisory"
              ],
              "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf"
            },
            {
              "name": "GLSA-202208-20",
              "refsource": "GENTOO",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.gentoo.org/glsa/202208-20"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 8.6,
          "impactScore": 6.4,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 2.2,
          "impactScore": 6.0
        }
      },
      "lastModifiedDate": "2022-10-05T02:21Z",
      "publishedDate": "2021-09-16T15:15Z"
    }
  }
}
  msrc_cve-2021-40438
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2021-40438 mod_proxy SSRF - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-40438.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "mod_proxy SSRF",
    "tracking": {
      "current_release_date": "2021-12-16T00:00:00.000Z",
      "generator": {
        "date": "2025-10-19T22:11:41.952Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2021-40438",
      "initial_release_date": "2021-09-02T00:00:00.000Z",
      "revision_history": [
        {
          "date": "2021-09-28T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        },
        {
          "date": "2021-12-16T00:00:00.000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added httpd to CBL-Mariner 2.0"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "1.0",
                "product": {
                  "name": "CBL Mariner 1.0",
                  "product_id": "16820"
                }
              },
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccm1 httpd 2.4.49-1",
                "product": {
                  "name": "\u003ccm1 httpd 2.4.49-1",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "cm1 httpd 2.4.49-1",
                "product": {
                  "name": "cm1 httpd 2.4.49-1",
                  "product_id": "16886"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 httpd 2.4.52-1",
                "product": {
                  "name": "\u003ccbl2 httpd 2.4.52-1",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 httpd 2.4.52-1",
                "product": {
                  "name": "cbl2 httpd 2.4.52-1",
                  "product_id": "17030"
                }
              }
            ],
            "category": "product_name",
            "name": "httpd"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccm1 httpd 2.4.49-1 as a component of CBL Mariner 1.0",
          "product_id": "16820-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "16820"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cm1 httpd 2.4.49-1 as a component of CBL Mariner 1.0",
          "product_id": "16886-16820"
        },
        "product_reference": "16886",
        "relates_to_product_reference": "16820"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 httpd 2.4.52-1 as a component of CBL Mariner 2.0",
          "product_id": "17086-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 httpd 2.4.52-1 as a component of CBL Mariner 2.0",
          "product_id": "17030-17086"
        },
        "product_reference": "17030",
        "relates_to_product_reference": "17086"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-40438",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "general",
          "text": "apache",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "16886-16820",
          "17030-17086"
        ],
        "known_affected": [
          "16820-2",
          "17086-1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-40438 mod_proxy SSRF - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-40438.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-28T00:00:00.000Z",
          "details": "2.4.49-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "16820-2"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2021-09-28T00:00:00.000Z",
          "details": "2.4.52-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "environmentalsScore": 0.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "temporalScore": 9.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "16820-2",
            "17086-1"
          ]
        }
      ],
      "title": "mod_proxy SSRF"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.